pulumi-azure-native 2.88.0a1739514756__py3-none-any.whl → 2.89.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure-native might be problematic. Click here for more details.

Files changed (52) hide show
  1. pulumi_azure_native/__init__.py +2 -0
  2. pulumi_azure_native/authorization/__init__.py +2 -0
  3. pulumi_azure_native/authorization/_enums.py +26 -0
  4. pulumi_azure_native/authorization/_inputs.py +194 -0
  5. pulumi_azure_native/authorization/get_management_lock_at_resource_level.py +8 -2
  6. pulumi_azure_native/authorization/get_pim_role_eligibility_schedule.py +355 -0
  7. pulumi_azure_native/authorization/management_lock_at_resource_level.py +21 -0
  8. pulumi_azure_native/authorization/outputs.py +445 -0
  9. pulumi_azure_native/authorization/pim_role_eligibility_schedule.py +511 -0
  10. pulumi_azure_native/authorization/v20200501/get_management_lock_at_resource_level.py +8 -2
  11. pulumi_azure_native/authorization/v20200501/management_lock_at_resource_level.py +21 -0
  12. pulumi_azure_native/authorization/v20201001/__init__.py +2 -0
  13. pulumi_azure_native/authorization/v20201001/_enums.py +26 -0
  14. pulumi_azure_native/authorization/v20201001/_inputs.py +194 -0
  15. pulumi_azure_native/authorization/v20201001/get_pim_role_eligibility_schedule.py +353 -0
  16. pulumi_azure_native/authorization/v20201001/outputs.py +445 -0
  17. pulumi_azure_native/authorization/v20201001/pim_role_eligibility_schedule.py +523 -0
  18. pulumi_azure_native/keyvault/_enums.py +0 -9
  19. pulumi_azure_native/keyvault/_inputs.py +1 -41
  20. pulumi_azure_native/keyvault/outputs.py +27 -29
  21. pulumi_azure_native/keyvault/v20230201/_enums.py +0 -9
  22. pulumi_azure_native/keyvault/v20230201/_inputs.py +1 -41
  23. pulumi_azure_native/keyvault/v20230201/outputs.py +27 -29
  24. pulumi_azure_native/keyvault/v20230701/_enums.py +0 -9
  25. pulumi_azure_native/keyvault/v20230701/_inputs.py +1 -41
  26. pulumi_azure_native/keyvault/v20230701/outputs.py +27 -29
  27. pulumi_azure_native/keyvault/v20240401preview/_enums.py +0 -9
  28. pulumi_azure_native/keyvault/v20240401preview/_inputs.py +1 -41
  29. pulumi_azure_native/keyvault/v20240401preview/outputs.py +27 -29
  30. pulumi_azure_native/keyvault/v20241101/_enums.py +0 -9
  31. pulumi_azure_native/keyvault/v20241101/_inputs.py +1 -41
  32. pulumi_azure_native/keyvault/v20241101/outputs.py +27 -29
  33. pulumi_azure_native/keyvault/v20241201preview/_enums.py +0 -9
  34. pulumi_azure_native/keyvault/v20241201preview/_inputs.py +1 -41
  35. pulumi_azure_native/keyvault/v20241201preview/outputs.py +27 -29
  36. pulumi_azure_native/pulumi-plugin.json +1 -1
  37. pulumi_azure_native/resources/get_resource.py +8 -2
  38. pulumi_azure_native/resources/resource.py +21 -0
  39. pulumi_azure_native/resources/v20220901/get_resource.py +8 -2
  40. pulumi_azure_native/resources/v20220901/resource.py +21 -0
  41. pulumi_azure_native/resources/v20230701/get_resource.py +8 -2
  42. pulumi_azure_native/resources/v20230701/resource.py +21 -0
  43. pulumi_azure_native/resources/v20240301/get_resource.py +8 -2
  44. pulumi_azure_native/resources/v20240301/resource.py +21 -0
  45. pulumi_azure_native/resources/v20240701/get_resource.py +8 -2
  46. pulumi_azure_native/resources/v20240701/resource.py +21 -0
  47. pulumi_azure_native/resources/v20241101/get_resource.py +8 -2
  48. pulumi_azure_native/resources/v20241101/resource.py +21 -0
  49. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/METADATA +1 -1
  50. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/RECORD +52 -48
  51. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/WHEEL +1 -1
  52. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/top_level.txt +0 -0
@@ -1968,8 +1968,12 @@ class VaultPropertiesResponse(dict):
1968
1968
  suggest = "hsm_pool_resource_id"
1969
1969
  elif key == "privateEndpointConnections":
1970
1970
  suggest = "private_endpoint_connections"
1971
+ elif key == "provisioningState":
1972
+ suggest = "provisioning_state"
1971
1973
  elif key == "tenantId":
1972
1974
  suggest = "tenant_id"
1975
+ elif key == "vaultUri":
1976
+ suggest = "vault_uri"
1973
1977
  elif key == "accessPolicies":
1974
1978
  suggest = "access_policies"
1975
1979
  elif key == "enablePurgeProtection":
@@ -1986,14 +1990,10 @@ class VaultPropertiesResponse(dict):
1986
1990
  suggest = "enabled_for_template_deployment"
1987
1991
  elif key == "networkAcls":
1988
1992
  suggest = "network_acls"
1989
- elif key == "provisioningState":
1990
- suggest = "provisioning_state"
1991
1993
  elif key == "publicNetworkAccess":
1992
1994
  suggest = "public_network_access"
1993
1995
  elif key == "softDeleteRetentionInDays":
1994
1996
  suggest = "soft_delete_retention_in_days"
1995
- elif key == "vaultUri":
1996
- suggest = "vault_uri"
1997
1997
 
1998
1998
  if suggest:
1999
1999
  pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
@@ -2009,8 +2009,10 @@ class VaultPropertiesResponse(dict):
2009
2009
  def __init__(__self__, *,
2010
2010
  hsm_pool_resource_id: str,
2011
2011
  private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
2012
+ provisioning_state: str,
2012
2013
  sku: 'outputs.SkuResponse',
2013
2014
  tenant_id: str,
2015
+ vault_uri: str,
2014
2016
  access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
2015
2017
  enable_purge_protection: Optional[bool] = None,
2016
2018
  enable_rbac_authorization: Optional[bool] = None,
@@ -2019,16 +2021,16 @@ class VaultPropertiesResponse(dict):
2019
2021
  enabled_for_disk_encryption: Optional[bool] = None,
2020
2022
  enabled_for_template_deployment: Optional[bool] = None,
2021
2023
  network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
2022
- provisioning_state: Optional[str] = None,
2023
2024
  public_network_access: Optional[str] = None,
2024
- soft_delete_retention_in_days: Optional[int] = None,
2025
- vault_uri: Optional[str] = None):
2025
+ soft_delete_retention_in_days: Optional[int] = None):
2026
2026
  """
2027
2027
  Properties of the vault
2028
2028
  :param str hsm_pool_resource_id: The resource id of HSM Pool.
2029
2029
  :param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
2030
+ :param str provisioning_state: Provisioning state of the vault.
2030
2031
  :param 'SkuResponse' sku: SKU details
2031
2032
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
2033
+ :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2032
2034
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2033
2035
  These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
2034
2036
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
@@ -2038,15 +2040,15 @@ class VaultPropertiesResponse(dict):
2038
2040
  :param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
2039
2041
  :param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
2040
2042
  :param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
2041
- :param str provisioning_state: Provisioning state of the vault.
2042
2043
  :param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
2043
2044
  :param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
2044
- :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2045
2045
  """
2046
2046
  pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
2047
2047
  pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
2048
+ pulumi.set(__self__, "provisioning_state", provisioning_state)
2048
2049
  pulumi.set(__self__, "sku", sku)
2049
2050
  pulumi.set(__self__, "tenant_id", tenant_id)
2051
+ pulumi.set(__self__, "vault_uri", vault_uri)
2050
2052
  if access_policies is not None:
2051
2053
  pulumi.set(__self__, "access_policies", access_policies)
2052
2054
  if enable_purge_protection is not None:
@@ -2067,8 +2069,6 @@ class VaultPropertiesResponse(dict):
2067
2069
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
2068
2070
  if network_acls is not None:
2069
2071
  pulumi.set(__self__, "network_acls", network_acls)
2070
- if provisioning_state is not None:
2071
- pulumi.set(__self__, "provisioning_state", provisioning_state)
2072
2072
  if public_network_access is None:
2073
2073
  public_network_access = 'enabled'
2074
2074
  if public_network_access is not None:
@@ -2077,8 +2077,6 @@ class VaultPropertiesResponse(dict):
2077
2077
  soft_delete_retention_in_days = 90
2078
2078
  if soft_delete_retention_in_days is not None:
2079
2079
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
2080
- if vault_uri is not None:
2081
- pulumi.set(__self__, "vault_uri", vault_uri)
2082
2080
 
2083
2081
  @property
2084
2082
  @pulumi.getter(name="hsmPoolResourceId")
@@ -2096,6 +2094,14 @@ class VaultPropertiesResponse(dict):
2096
2094
  """
2097
2095
  return pulumi.get(self, "private_endpoint_connections")
2098
2096
 
2097
+ @property
2098
+ @pulumi.getter(name="provisioningState")
2099
+ def provisioning_state(self) -> str:
2100
+ """
2101
+ Provisioning state of the vault.
2102
+ """
2103
+ return pulumi.get(self, "provisioning_state")
2104
+
2099
2105
  @property
2100
2106
  @pulumi.getter
2101
2107
  def sku(self) -> 'outputs.SkuResponse':
@@ -2112,6 +2118,14 @@ class VaultPropertiesResponse(dict):
2112
2118
  """
2113
2119
  return pulumi.get(self, "tenant_id")
2114
2120
 
2121
+ @property
2122
+ @pulumi.getter(name="vaultUri")
2123
+ def vault_uri(self) -> str:
2124
+ """
2125
+ The URI of the vault for performing operations on keys and secrets.
2126
+ """
2127
+ return pulumi.get(self, "vault_uri")
2128
+
2115
2129
  @property
2116
2130
  @pulumi.getter(name="accessPolicies")
2117
2131
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
@@ -2177,14 +2191,6 @@ class VaultPropertiesResponse(dict):
2177
2191
  """
2178
2192
  return pulumi.get(self, "network_acls")
2179
2193
 
2180
- @property
2181
- @pulumi.getter(name="provisioningState")
2182
- def provisioning_state(self) -> Optional[str]:
2183
- """
2184
- Provisioning state of the vault.
2185
- """
2186
- return pulumi.get(self, "provisioning_state")
2187
-
2188
2194
  @property
2189
2195
  @pulumi.getter(name="publicNetworkAccess")
2190
2196
  def public_network_access(self) -> Optional[str]:
@@ -2201,14 +2207,6 @@ class VaultPropertiesResponse(dict):
2201
2207
  """
2202
2208
  return pulumi.get(self, "soft_delete_retention_in_days")
2203
2209
 
2204
- @property
2205
- @pulumi.getter(name="vaultUri")
2206
- def vault_uri(self) -> Optional[str]:
2207
- """
2208
- The URI of the vault for performing operations on keys and secrets.
2209
- """
2210
- return pulumi.get(self, "vault_uri")
2211
-
2212
2210
 
2213
2211
  @pulumi.output_type
2214
2212
  class VirtualNetworkRuleResponse(dict):
@@ -24,7 +24,6 @@ __all__ = [
24
24
  'SkuFamily',
25
25
  'SkuName',
26
26
  'StoragePermissions',
27
- 'VaultProvisioningState',
28
27
  ]
29
28
 
30
29
 
@@ -232,11 +231,3 @@ class StoragePermissions(str, Enum):
232
231
  LISTSAS = "listsas"
233
232
  GETSAS = "getsas"
234
233
  DELETESAS = "deletesas"
235
-
236
-
237
- class VaultProvisioningState(str, Enum):
238
- """
239
- Provisioning state of the vault.
240
- """
241
- SUCCEEDED = "Succeeded"
242
- REGISTERING_DNS = "RegisteringDns"
@@ -1856,10 +1856,6 @@ if not MYPY:
1856
1856
  """
1857
1857
  Rules governing the accessibility of the key vault from specific network locations.
1858
1858
  """
1859
- provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
1860
- """
1861
- Provisioning state of the vault.
1862
- """
1863
1859
  public_network_access: NotRequired[pulumi.Input[str]]
1864
1860
  """
1865
1861
  Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
@@ -1868,10 +1864,6 @@ if not MYPY:
1868
1864
  """
1869
1865
  softDelete data retention days. It accepts >=7 and <=90.
1870
1866
  """
1871
- vault_uri: NotRequired[pulumi.Input[str]]
1872
- """
1873
- The URI of the vault for performing operations on keys and secrets.
1874
- """
1875
1867
  elif False:
1876
1868
  VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
1877
1869
 
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
1889
1881
  enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
1890
1882
  enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
1891
1883
  network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
1892
- provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
1893
1884
  public_network_access: Optional[pulumi.Input[str]] = None,
1894
- soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
1895
- vault_uri: Optional[pulumi.Input[str]] = None):
1885
+ soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
1896
1886
  """
1897
1887
  Properties of the vault
1898
1888
  :param pulumi.Input['SkuArgs'] sku: SKU details
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
1907
1897
  :param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
1908
1898
  :param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
1909
1899
  :param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
1910
- :param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
1911
1900
  :param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
1912
1901
  :param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
1913
- :param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
1914
1902
  """
1915
1903
  pulumi.set(__self__, "sku", sku)
1916
1904
  pulumi.set(__self__, "tenant_id", tenant_id)
@@ -1936,8 +1924,6 @@ class VaultPropertiesArgs:
1936
1924
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
1937
1925
  if network_acls is not None:
1938
1926
  pulumi.set(__self__, "network_acls", network_acls)
1939
- if provisioning_state is not None:
1940
- pulumi.set(__self__, "provisioning_state", provisioning_state)
1941
1927
  if public_network_access is None:
1942
1928
  public_network_access = 'enabled'
1943
1929
  if public_network_access is not None:
@@ -1946,8 +1932,6 @@ class VaultPropertiesArgs:
1946
1932
  soft_delete_retention_in_days = 90
1947
1933
  if soft_delete_retention_in_days is not None:
1948
1934
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
1949
- if vault_uri is not None:
1950
- pulumi.set(__self__, "vault_uri", vault_uri)
1951
1935
 
1952
1936
  @property
1953
1937
  @pulumi.getter
@@ -2082,18 +2066,6 @@ class VaultPropertiesArgs:
2082
2066
  def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
2083
2067
  pulumi.set(self, "network_acls", value)
2084
2068
 
2085
- @property
2086
- @pulumi.getter(name="provisioningState")
2087
- def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
2088
- """
2089
- Provisioning state of the vault.
2090
- """
2091
- return pulumi.get(self, "provisioning_state")
2092
-
2093
- @provisioning_state.setter
2094
- def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
2095
- pulumi.set(self, "provisioning_state", value)
2096
-
2097
2069
  @property
2098
2070
  @pulumi.getter(name="publicNetworkAccess")
2099
2071
  def public_network_access(self) -> Optional[pulumi.Input[str]]:
@@ -2118,18 +2090,6 @@ class VaultPropertiesArgs:
2118
2090
  def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
2119
2091
  pulumi.set(self, "soft_delete_retention_in_days", value)
2120
2092
 
2121
- @property
2122
- @pulumi.getter(name="vaultUri")
2123
- def vault_uri(self) -> Optional[pulumi.Input[str]]:
2124
- """
2125
- The URI of the vault for performing operations on keys and secrets.
2126
- """
2127
- return pulumi.get(self, "vault_uri")
2128
-
2129
- @vault_uri.setter
2130
- def vault_uri(self, value: Optional[pulumi.Input[str]]):
2131
- pulumi.set(self, "vault_uri", value)
2132
-
2133
2093
 
2134
2094
  if not MYPY:
2135
2095
  class VirtualNetworkRuleArgsDict(TypedDict):
@@ -1968,8 +1968,12 @@ class VaultPropertiesResponse(dict):
1968
1968
  suggest = "hsm_pool_resource_id"
1969
1969
  elif key == "privateEndpointConnections":
1970
1970
  suggest = "private_endpoint_connections"
1971
+ elif key == "provisioningState":
1972
+ suggest = "provisioning_state"
1971
1973
  elif key == "tenantId":
1972
1974
  suggest = "tenant_id"
1975
+ elif key == "vaultUri":
1976
+ suggest = "vault_uri"
1973
1977
  elif key == "accessPolicies":
1974
1978
  suggest = "access_policies"
1975
1979
  elif key == "enablePurgeProtection":
@@ -1986,14 +1990,10 @@ class VaultPropertiesResponse(dict):
1986
1990
  suggest = "enabled_for_template_deployment"
1987
1991
  elif key == "networkAcls":
1988
1992
  suggest = "network_acls"
1989
- elif key == "provisioningState":
1990
- suggest = "provisioning_state"
1991
1993
  elif key == "publicNetworkAccess":
1992
1994
  suggest = "public_network_access"
1993
1995
  elif key == "softDeleteRetentionInDays":
1994
1996
  suggest = "soft_delete_retention_in_days"
1995
- elif key == "vaultUri":
1996
- suggest = "vault_uri"
1997
1997
 
1998
1998
  if suggest:
1999
1999
  pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
@@ -2009,8 +2009,10 @@ class VaultPropertiesResponse(dict):
2009
2009
  def __init__(__self__, *,
2010
2010
  hsm_pool_resource_id: str,
2011
2011
  private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
2012
+ provisioning_state: str,
2012
2013
  sku: 'outputs.SkuResponse',
2013
2014
  tenant_id: str,
2015
+ vault_uri: str,
2014
2016
  access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
2015
2017
  enable_purge_protection: Optional[bool] = None,
2016
2018
  enable_rbac_authorization: Optional[bool] = None,
@@ -2019,16 +2021,16 @@ class VaultPropertiesResponse(dict):
2019
2021
  enabled_for_disk_encryption: Optional[bool] = None,
2020
2022
  enabled_for_template_deployment: Optional[bool] = None,
2021
2023
  network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
2022
- provisioning_state: Optional[str] = None,
2023
2024
  public_network_access: Optional[str] = None,
2024
- soft_delete_retention_in_days: Optional[int] = None,
2025
- vault_uri: Optional[str] = None):
2025
+ soft_delete_retention_in_days: Optional[int] = None):
2026
2026
  """
2027
2027
  Properties of the vault
2028
2028
  :param str hsm_pool_resource_id: The resource id of HSM Pool.
2029
2029
  :param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
2030
+ :param str provisioning_state: Provisioning state of the vault.
2030
2031
  :param 'SkuResponse' sku: SKU details
2031
2032
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
2033
+ :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2032
2034
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2033
2035
  These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
2034
2036
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
@@ -2038,15 +2040,15 @@ class VaultPropertiesResponse(dict):
2038
2040
  :param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
2039
2041
  :param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
2040
2042
  :param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
2041
- :param str provisioning_state: Provisioning state of the vault.
2042
2043
  :param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
2043
2044
  :param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
2044
- :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2045
2045
  """
2046
2046
  pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
2047
2047
  pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
2048
+ pulumi.set(__self__, "provisioning_state", provisioning_state)
2048
2049
  pulumi.set(__self__, "sku", sku)
2049
2050
  pulumi.set(__self__, "tenant_id", tenant_id)
2051
+ pulumi.set(__self__, "vault_uri", vault_uri)
2050
2052
  if access_policies is not None:
2051
2053
  pulumi.set(__self__, "access_policies", access_policies)
2052
2054
  if enable_purge_protection is not None:
@@ -2067,8 +2069,6 @@ class VaultPropertiesResponse(dict):
2067
2069
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
2068
2070
  if network_acls is not None:
2069
2071
  pulumi.set(__self__, "network_acls", network_acls)
2070
- if provisioning_state is not None:
2071
- pulumi.set(__self__, "provisioning_state", provisioning_state)
2072
2072
  if public_network_access is None:
2073
2073
  public_network_access = 'enabled'
2074
2074
  if public_network_access is not None:
@@ -2077,8 +2077,6 @@ class VaultPropertiesResponse(dict):
2077
2077
  soft_delete_retention_in_days = 90
2078
2078
  if soft_delete_retention_in_days is not None:
2079
2079
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
2080
- if vault_uri is not None:
2081
- pulumi.set(__self__, "vault_uri", vault_uri)
2082
2080
 
2083
2081
  @property
2084
2082
  @pulumi.getter(name="hsmPoolResourceId")
@@ -2096,6 +2094,14 @@ class VaultPropertiesResponse(dict):
2096
2094
  """
2097
2095
  return pulumi.get(self, "private_endpoint_connections")
2098
2096
 
2097
+ @property
2098
+ @pulumi.getter(name="provisioningState")
2099
+ def provisioning_state(self) -> str:
2100
+ """
2101
+ Provisioning state of the vault.
2102
+ """
2103
+ return pulumi.get(self, "provisioning_state")
2104
+
2099
2105
  @property
2100
2106
  @pulumi.getter
2101
2107
  def sku(self) -> 'outputs.SkuResponse':
@@ -2112,6 +2118,14 @@ class VaultPropertiesResponse(dict):
2112
2118
  """
2113
2119
  return pulumi.get(self, "tenant_id")
2114
2120
 
2121
+ @property
2122
+ @pulumi.getter(name="vaultUri")
2123
+ def vault_uri(self) -> str:
2124
+ """
2125
+ The URI of the vault for performing operations on keys and secrets.
2126
+ """
2127
+ return pulumi.get(self, "vault_uri")
2128
+
2115
2129
  @property
2116
2130
  @pulumi.getter(name="accessPolicies")
2117
2131
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
@@ -2177,14 +2191,6 @@ class VaultPropertiesResponse(dict):
2177
2191
  """
2178
2192
  return pulumi.get(self, "network_acls")
2179
2193
 
2180
- @property
2181
- @pulumi.getter(name="provisioningState")
2182
- def provisioning_state(self) -> Optional[str]:
2183
- """
2184
- Provisioning state of the vault.
2185
- """
2186
- return pulumi.get(self, "provisioning_state")
2187
-
2188
2194
  @property
2189
2195
  @pulumi.getter(name="publicNetworkAccess")
2190
2196
  def public_network_access(self) -> Optional[str]:
@@ -2201,14 +2207,6 @@ class VaultPropertiesResponse(dict):
2201
2207
  """
2202
2208
  return pulumi.get(self, "soft_delete_retention_in_days")
2203
2209
 
2204
- @property
2205
- @pulumi.getter(name="vaultUri")
2206
- def vault_uri(self) -> Optional[str]:
2207
- """
2208
- The URI of the vault for performing operations on keys and secrets.
2209
- """
2210
- return pulumi.get(self, "vault_uri")
2211
-
2212
2210
 
2213
2211
  @pulumi.output_type
2214
2212
  class VirtualNetworkRuleResponse(dict):
@@ -24,7 +24,6 @@ __all__ = [
24
24
  'SkuFamily',
25
25
  'SkuName',
26
26
  'StoragePermissions',
27
- 'VaultProvisioningState',
28
27
  ]
29
28
 
30
29
 
@@ -235,11 +234,3 @@ class StoragePermissions(str, Enum):
235
234
  LISTSAS = "listsas"
236
235
  GETSAS = "getsas"
237
236
  DELETESAS = "deletesas"
238
-
239
-
240
- class VaultProvisioningState(str, Enum):
241
- """
242
- Provisioning state of the vault.
243
- """
244
- SUCCEEDED = "Succeeded"
245
- REGISTERING_DNS = "RegisteringDns"
@@ -1856,10 +1856,6 @@ if not MYPY:
1856
1856
  """
1857
1857
  Rules governing the accessibility of the key vault from specific network locations.
1858
1858
  """
1859
- provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
1860
- """
1861
- Provisioning state of the vault.
1862
- """
1863
1859
  public_network_access: NotRequired[pulumi.Input[str]]
1864
1860
  """
1865
1861
  Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
@@ -1868,10 +1864,6 @@ if not MYPY:
1868
1864
  """
1869
1865
  softDelete data retention days. It accepts >=7 and <=90.
1870
1866
  """
1871
- vault_uri: NotRequired[pulumi.Input[str]]
1872
- """
1873
- The URI of the vault for performing operations on keys and secrets.
1874
- """
1875
1867
  elif False:
1876
1868
  VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
1877
1869
 
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
1889
1881
  enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
1890
1882
  enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
1891
1883
  network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
1892
- provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
1893
1884
  public_network_access: Optional[pulumi.Input[str]] = None,
1894
- soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
1895
- vault_uri: Optional[pulumi.Input[str]] = None):
1885
+ soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
1896
1886
  """
1897
1887
  Properties of the vault
1898
1888
  :param pulumi.Input['SkuArgs'] sku: SKU details
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
1907
1897
  :param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
1908
1898
  :param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
1909
1899
  :param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
1910
- :param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
1911
1900
  :param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
1912
1901
  :param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
1913
- :param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
1914
1902
  """
1915
1903
  pulumi.set(__self__, "sku", sku)
1916
1904
  pulumi.set(__self__, "tenant_id", tenant_id)
@@ -1942,8 +1930,6 @@ class VaultPropertiesArgs:
1942
1930
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
1943
1931
  if network_acls is not None:
1944
1932
  pulumi.set(__self__, "network_acls", network_acls)
1945
- if provisioning_state is not None:
1946
- pulumi.set(__self__, "provisioning_state", provisioning_state)
1947
1933
  if public_network_access is None:
1948
1934
  public_network_access = 'enabled'
1949
1935
  if public_network_access is not None:
@@ -1952,8 +1938,6 @@ class VaultPropertiesArgs:
1952
1938
  soft_delete_retention_in_days = 90
1953
1939
  if soft_delete_retention_in_days is not None:
1954
1940
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
1955
- if vault_uri is not None:
1956
- pulumi.set(__self__, "vault_uri", vault_uri)
1957
1941
 
1958
1942
  @property
1959
1943
  @pulumi.getter
@@ -2088,18 +2072,6 @@ class VaultPropertiesArgs:
2088
2072
  def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
2089
2073
  pulumi.set(self, "network_acls", value)
2090
2074
 
2091
- @property
2092
- @pulumi.getter(name="provisioningState")
2093
- def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
2094
- """
2095
- Provisioning state of the vault.
2096
- """
2097
- return pulumi.get(self, "provisioning_state")
2098
-
2099
- @provisioning_state.setter
2100
- def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
2101
- pulumi.set(self, "provisioning_state", value)
2102
-
2103
2075
  @property
2104
2076
  @pulumi.getter(name="publicNetworkAccess")
2105
2077
  def public_network_access(self) -> Optional[pulumi.Input[str]]:
@@ -2124,18 +2096,6 @@ class VaultPropertiesArgs:
2124
2096
  def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
2125
2097
  pulumi.set(self, "soft_delete_retention_in_days", value)
2126
2098
 
2127
- @property
2128
- @pulumi.getter(name="vaultUri")
2129
- def vault_uri(self) -> Optional[pulumi.Input[str]]:
2130
- """
2131
- The URI of the vault for performing operations on keys and secrets.
2132
- """
2133
- return pulumi.get(self, "vault_uri")
2134
-
2135
- @vault_uri.setter
2136
- def vault_uri(self, value: Optional[pulumi.Input[str]]):
2137
- pulumi.set(self, "vault_uri", value)
2138
-
2139
2099
 
2140
2100
  if not MYPY:
2141
2101
  class VirtualNetworkRuleArgsDict(TypedDict):