pulumi-azure-native 2.88.0a1739514756__py3-none-any.whl → 2.89.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +2 -0
- pulumi_azure_native/authorization/__init__.py +2 -0
- pulumi_azure_native/authorization/_enums.py +26 -0
- pulumi_azure_native/authorization/_inputs.py +194 -0
- pulumi_azure_native/authorization/get_management_lock_at_resource_level.py +8 -2
- pulumi_azure_native/authorization/get_pim_role_eligibility_schedule.py +355 -0
- pulumi_azure_native/authorization/management_lock_at_resource_level.py +21 -0
- pulumi_azure_native/authorization/outputs.py +445 -0
- pulumi_azure_native/authorization/pim_role_eligibility_schedule.py +511 -0
- pulumi_azure_native/authorization/v20200501/get_management_lock_at_resource_level.py +8 -2
- pulumi_azure_native/authorization/v20200501/management_lock_at_resource_level.py +21 -0
- pulumi_azure_native/authorization/v20201001/__init__.py +2 -0
- pulumi_azure_native/authorization/v20201001/_enums.py +26 -0
- pulumi_azure_native/authorization/v20201001/_inputs.py +194 -0
- pulumi_azure_native/authorization/v20201001/get_pim_role_eligibility_schedule.py +353 -0
- pulumi_azure_native/authorization/v20201001/outputs.py +445 -0
- pulumi_azure_native/authorization/v20201001/pim_role_eligibility_schedule.py +523 -0
- pulumi_azure_native/keyvault/_enums.py +0 -9
- pulumi_azure_native/keyvault/_inputs.py +1 -41
- pulumi_azure_native/keyvault/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20230201/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20230201/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20230201/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20230701/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20230701/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20230701/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20240401preview/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20240401preview/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20240401preview/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20241101/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20241101/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20241101/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20241201preview/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20241201preview/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20241201preview/outputs.py +27 -29
- pulumi_azure_native/pulumi-plugin.json +1 -1
- pulumi_azure_native/resources/get_resource.py +8 -2
- pulumi_azure_native/resources/resource.py +21 -0
- pulumi_azure_native/resources/v20220901/get_resource.py +8 -2
- pulumi_azure_native/resources/v20220901/resource.py +21 -0
- pulumi_azure_native/resources/v20230701/get_resource.py +8 -2
- pulumi_azure_native/resources/v20230701/resource.py +21 -0
- pulumi_azure_native/resources/v20240301/get_resource.py +8 -2
- pulumi_azure_native/resources/v20240301/resource.py +21 -0
- pulumi_azure_native/resources/v20240701/get_resource.py +8 -2
- pulumi_azure_native/resources/v20240701/resource.py +21 -0
- pulumi_azure_native/resources/v20241101/get_resource.py +8 -2
- pulumi_azure_native/resources/v20241101/resource.py +21 -0
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/RECORD +52 -48
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/WHEEL +1 -1
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0.dist-info}/top_level.txt +0 -0
|
@@ -1968,8 +1968,12 @@ class VaultPropertiesResponse(dict):
|
|
|
1968
1968
|
suggest = "hsm_pool_resource_id"
|
|
1969
1969
|
elif key == "privateEndpointConnections":
|
|
1970
1970
|
suggest = "private_endpoint_connections"
|
|
1971
|
+
elif key == "provisioningState":
|
|
1972
|
+
suggest = "provisioning_state"
|
|
1971
1973
|
elif key == "tenantId":
|
|
1972
1974
|
suggest = "tenant_id"
|
|
1975
|
+
elif key == "vaultUri":
|
|
1976
|
+
suggest = "vault_uri"
|
|
1973
1977
|
elif key == "accessPolicies":
|
|
1974
1978
|
suggest = "access_policies"
|
|
1975
1979
|
elif key == "enablePurgeProtection":
|
|
@@ -1986,14 +1990,10 @@ class VaultPropertiesResponse(dict):
|
|
|
1986
1990
|
suggest = "enabled_for_template_deployment"
|
|
1987
1991
|
elif key == "networkAcls":
|
|
1988
1992
|
suggest = "network_acls"
|
|
1989
|
-
elif key == "provisioningState":
|
|
1990
|
-
suggest = "provisioning_state"
|
|
1991
1993
|
elif key == "publicNetworkAccess":
|
|
1992
1994
|
suggest = "public_network_access"
|
|
1993
1995
|
elif key == "softDeleteRetentionInDays":
|
|
1994
1996
|
suggest = "soft_delete_retention_in_days"
|
|
1995
|
-
elif key == "vaultUri":
|
|
1996
|
-
suggest = "vault_uri"
|
|
1997
1997
|
|
|
1998
1998
|
if suggest:
|
|
1999
1999
|
pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -2009,8 +2009,10 @@ class VaultPropertiesResponse(dict):
|
|
|
2009
2009
|
def __init__(__self__, *,
|
|
2010
2010
|
hsm_pool_resource_id: str,
|
|
2011
2011
|
private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
|
|
2012
|
+
provisioning_state: str,
|
|
2012
2013
|
sku: 'outputs.SkuResponse',
|
|
2013
2014
|
tenant_id: str,
|
|
2015
|
+
vault_uri: str,
|
|
2014
2016
|
access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
|
|
2015
2017
|
enable_purge_protection: Optional[bool] = None,
|
|
2016
2018
|
enable_rbac_authorization: Optional[bool] = None,
|
|
@@ -2019,16 +2021,16 @@ class VaultPropertiesResponse(dict):
|
|
|
2019
2021
|
enabled_for_disk_encryption: Optional[bool] = None,
|
|
2020
2022
|
enabled_for_template_deployment: Optional[bool] = None,
|
|
2021
2023
|
network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
|
|
2022
|
-
provisioning_state: Optional[str] = None,
|
|
2023
2024
|
public_network_access: Optional[str] = None,
|
|
2024
|
-
soft_delete_retention_in_days: Optional[int] = None
|
|
2025
|
-
vault_uri: Optional[str] = None):
|
|
2025
|
+
soft_delete_retention_in_days: Optional[int] = None):
|
|
2026
2026
|
"""
|
|
2027
2027
|
Properties of the vault
|
|
2028
2028
|
:param str hsm_pool_resource_id: The resource id of HSM Pool.
|
|
2029
2029
|
:param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
|
|
2030
|
+
:param str provisioning_state: Provisioning state of the vault.
|
|
2030
2031
|
:param 'SkuResponse' sku: SKU details
|
|
2031
2032
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
2033
|
+
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2032
2034
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2033
2035
|
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
2034
2036
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
@@ -2038,15 +2040,15 @@ class VaultPropertiesResponse(dict):
|
|
|
2038
2040
|
:param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
2039
2041
|
:param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
2040
2042
|
:param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
2041
|
-
:param str provisioning_state: Provisioning state of the vault.
|
|
2042
2043
|
:param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
2043
2044
|
:param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
2044
|
-
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2045
2045
|
"""
|
|
2046
2046
|
pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
|
|
2047
2047
|
pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
|
|
2048
|
+
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2048
2049
|
pulumi.set(__self__, "sku", sku)
|
|
2049
2050
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
2051
|
+
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2050
2052
|
if access_policies is not None:
|
|
2051
2053
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
2052
2054
|
if enable_purge_protection is not None:
|
|
@@ -2067,8 +2069,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2067
2069
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
2068
2070
|
if network_acls is not None:
|
|
2069
2071
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
2070
|
-
if provisioning_state is not None:
|
|
2071
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2072
2072
|
if public_network_access is None:
|
|
2073
2073
|
public_network_access = 'enabled'
|
|
2074
2074
|
if public_network_access is not None:
|
|
@@ -2077,8 +2077,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2077
2077
|
soft_delete_retention_in_days = 90
|
|
2078
2078
|
if soft_delete_retention_in_days is not None:
|
|
2079
2079
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
2080
|
-
if vault_uri is not None:
|
|
2081
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2082
2080
|
|
|
2083
2081
|
@property
|
|
2084
2082
|
@pulumi.getter(name="hsmPoolResourceId")
|
|
@@ -2096,6 +2094,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2096
2094
|
"""
|
|
2097
2095
|
return pulumi.get(self, "private_endpoint_connections")
|
|
2098
2096
|
|
|
2097
|
+
@property
|
|
2098
|
+
@pulumi.getter(name="provisioningState")
|
|
2099
|
+
def provisioning_state(self) -> str:
|
|
2100
|
+
"""
|
|
2101
|
+
Provisioning state of the vault.
|
|
2102
|
+
"""
|
|
2103
|
+
return pulumi.get(self, "provisioning_state")
|
|
2104
|
+
|
|
2099
2105
|
@property
|
|
2100
2106
|
@pulumi.getter
|
|
2101
2107
|
def sku(self) -> 'outputs.SkuResponse':
|
|
@@ -2112,6 +2118,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2112
2118
|
"""
|
|
2113
2119
|
return pulumi.get(self, "tenant_id")
|
|
2114
2120
|
|
|
2121
|
+
@property
|
|
2122
|
+
@pulumi.getter(name="vaultUri")
|
|
2123
|
+
def vault_uri(self) -> str:
|
|
2124
|
+
"""
|
|
2125
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
2126
|
+
"""
|
|
2127
|
+
return pulumi.get(self, "vault_uri")
|
|
2128
|
+
|
|
2115
2129
|
@property
|
|
2116
2130
|
@pulumi.getter(name="accessPolicies")
|
|
2117
2131
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
@@ -2177,14 +2191,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2177
2191
|
"""
|
|
2178
2192
|
return pulumi.get(self, "network_acls")
|
|
2179
2193
|
|
|
2180
|
-
@property
|
|
2181
|
-
@pulumi.getter(name="provisioningState")
|
|
2182
|
-
def provisioning_state(self) -> Optional[str]:
|
|
2183
|
-
"""
|
|
2184
|
-
Provisioning state of the vault.
|
|
2185
|
-
"""
|
|
2186
|
-
return pulumi.get(self, "provisioning_state")
|
|
2187
|
-
|
|
2188
2194
|
@property
|
|
2189
2195
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2190
2196
|
def public_network_access(self) -> Optional[str]:
|
|
@@ -2201,14 +2207,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2201
2207
|
"""
|
|
2202
2208
|
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
2203
2209
|
|
|
2204
|
-
@property
|
|
2205
|
-
@pulumi.getter(name="vaultUri")
|
|
2206
|
-
def vault_uri(self) -> Optional[str]:
|
|
2207
|
-
"""
|
|
2208
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2209
|
-
"""
|
|
2210
|
-
return pulumi.get(self, "vault_uri")
|
|
2211
|
-
|
|
2212
2210
|
|
|
2213
2211
|
@pulumi.output_type
|
|
2214
2212
|
class VirtualNetworkRuleResponse(dict):
|
|
@@ -24,7 +24,6 @@ __all__ = [
|
|
|
24
24
|
'SkuFamily',
|
|
25
25
|
'SkuName',
|
|
26
26
|
'StoragePermissions',
|
|
27
|
-
'VaultProvisioningState',
|
|
28
27
|
]
|
|
29
28
|
|
|
30
29
|
|
|
@@ -232,11 +231,3 @@ class StoragePermissions(str, Enum):
|
|
|
232
231
|
LISTSAS = "listsas"
|
|
233
232
|
GETSAS = "getsas"
|
|
234
233
|
DELETESAS = "deletesas"
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
class VaultProvisioningState(str, Enum):
|
|
238
|
-
"""
|
|
239
|
-
Provisioning state of the vault.
|
|
240
|
-
"""
|
|
241
|
-
SUCCEEDED = "Succeeded"
|
|
242
|
-
REGISTERING_DNS = "RegisteringDns"
|
|
@@ -1856,10 +1856,6 @@ if not MYPY:
|
|
|
1856
1856
|
"""
|
|
1857
1857
|
Rules governing the accessibility of the key vault from specific network locations.
|
|
1858
1858
|
"""
|
|
1859
|
-
provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
|
|
1860
|
-
"""
|
|
1861
|
-
Provisioning state of the vault.
|
|
1862
|
-
"""
|
|
1863
1859
|
public_network_access: NotRequired[pulumi.Input[str]]
|
|
1864
1860
|
"""
|
|
1865
1861
|
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
@@ -1868,10 +1864,6 @@ if not MYPY:
|
|
|
1868
1864
|
"""
|
|
1869
1865
|
softDelete data retention days. It accepts >=7 and <=90.
|
|
1870
1866
|
"""
|
|
1871
|
-
vault_uri: NotRequired[pulumi.Input[str]]
|
|
1872
|
-
"""
|
|
1873
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
1874
|
-
"""
|
|
1875
1867
|
elif False:
|
|
1876
1868
|
VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1877
1869
|
|
|
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
|
|
|
1889
1881
|
enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
|
|
1890
1882
|
enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1891
1883
|
network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
|
|
1892
|
-
provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
|
|
1893
1884
|
public_network_access: Optional[pulumi.Input[str]] = None,
|
|
1894
|
-
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None
|
|
1895
|
-
vault_uri: Optional[pulumi.Input[str]] = None):
|
|
1885
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
|
|
1896
1886
|
"""
|
|
1897
1887
|
Properties of the vault
|
|
1898
1888
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
|
|
|
1907
1897
|
:param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1908
1898
|
:param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1909
1899
|
:param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1910
|
-
:param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
|
|
1911
1900
|
:param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1912
1901
|
:param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1913
|
-
:param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1914
1902
|
"""
|
|
1915
1903
|
pulumi.set(__self__, "sku", sku)
|
|
1916
1904
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
@@ -1936,8 +1924,6 @@ class VaultPropertiesArgs:
|
|
|
1936
1924
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1937
1925
|
if network_acls is not None:
|
|
1938
1926
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
1939
|
-
if provisioning_state is not None:
|
|
1940
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1941
1927
|
if public_network_access is None:
|
|
1942
1928
|
public_network_access = 'enabled'
|
|
1943
1929
|
if public_network_access is not None:
|
|
@@ -1946,8 +1932,6 @@ class VaultPropertiesArgs:
|
|
|
1946
1932
|
soft_delete_retention_in_days = 90
|
|
1947
1933
|
if soft_delete_retention_in_days is not None:
|
|
1948
1934
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1949
|
-
if vault_uri is not None:
|
|
1950
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1951
1935
|
|
|
1952
1936
|
@property
|
|
1953
1937
|
@pulumi.getter
|
|
@@ -2082,18 +2066,6 @@ class VaultPropertiesArgs:
|
|
|
2082
2066
|
def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
|
|
2083
2067
|
pulumi.set(self, "network_acls", value)
|
|
2084
2068
|
|
|
2085
|
-
@property
|
|
2086
|
-
@pulumi.getter(name="provisioningState")
|
|
2087
|
-
def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
|
|
2088
|
-
"""
|
|
2089
|
-
Provisioning state of the vault.
|
|
2090
|
-
"""
|
|
2091
|
-
return pulumi.get(self, "provisioning_state")
|
|
2092
|
-
|
|
2093
|
-
@provisioning_state.setter
|
|
2094
|
-
def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
|
|
2095
|
-
pulumi.set(self, "provisioning_state", value)
|
|
2096
|
-
|
|
2097
2069
|
@property
|
|
2098
2070
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2099
2071
|
def public_network_access(self) -> Optional[pulumi.Input[str]]:
|
|
@@ -2118,18 +2090,6 @@ class VaultPropertiesArgs:
|
|
|
2118
2090
|
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
2119
2091
|
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
2120
2092
|
|
|
2121
|
-
@property
|
|
2122
|
-
@pulumi.getter(name="vaultUri")
|
|
2123
|
-
def vault_uri(self) -> Optional[pulumi.Input[str]]:
|
|
2124
|
-
"""
|
|
2125
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2126
|
-
"""
|
|
2127
|
-
return pulumi.get(self, "vault_uri")
|
|
2128
|
-
|
|
2129
|
-
@vault_uri.setter
|
|
2130
|
-
def vault_uri(self, value: Optional[pulumi.Input[str]]):
|
|
2131
|
-
pulumi.set(self, "vault_uri", value)
|
|
2132
|
-
|
|
2133
2093
|
|
|
2134
2094
|
if not MYPY:
|
|
2135
2095
|
class VirtualNetworkRuleArgsDict(TypedDict):
|
|
@@ -1968,8 +1968,12 @@ class VaultPropertiesResponse(dict):
|
|
|
1968
1968
|
suggest = "hsm_pool_resource_id"
|
|
1969
1969
|
elif key == "privateEndpointConnections":
|
|
1970
1970
|
suggest = "private_endpoint_connections"
|
|
1971
|
+
elif key == "provisioningState":
|
|
1972
|
+
suggest = "provisioning_state"
|
|
1971
1973
|
elif key == "tenantId":
|
|
1972
1974
|
suggest = "tenant_id"
|
|
1975
|
+
elif key == "vaultUri":
|
|
1976
|
+
suggest = "vault_uri"
|
|
1973
1977
|
elif key == "accessPolicies":
|
|
1974
1978
|
suggest = "access_policies"
|
|
1975
1979
|
elif key == "enablePurgeProtection":
|
|
@@ -1986,14 +1990,10 @@ class VaultPropertiesResponse(dict):
|
|
|
1986
1990
|
suggest = "enabled_for_template_deployment"
|
|
1987
1991
|
elif key == "networkAcls":
|
|
1988
1992
|
suggest = "network_acls"
|
|
1989
|
-
elif key == "provisioningState":
|
|
1990
|
-
suggest = "provisioning_state"
|
|
1991
1993
|
elif key == "publicNetworkAccess":
|
|
1992
1994
|
suggest = "public_network_access"
|
|
1993
1995
|
elif key == "softDeleteRetentionInDays":
|
|
1994
1996
|
suggest = "soft_delete_retention_in_days"
|
|
1995
|
-
elif key == "vaultUri":
|
|
1996
|
-
suggest = "vault_uri"
|
|
1997
1997
|
|
|
1998
1998
|
if suggest:
|
|
1999
1999
|
pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -2009,8 +2009,10 @@ class VaultPropertiesResponse(dict):
|
|
|
2009
2009
|
def __init__(__self__, *,
|
|
2010
2010
|
hsm_pool_resource_id: str,
|
|
2011
2011
|
private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
|
|
2012
|
+
provisioning_state: str,
|
|
2012
2013
|
sku: 'outputs.SkuResponse',
|
|
2013
2014
|
tenant_id: str,
|
|
2015
|
+
vault_uri: str,
|
|
2014
2016
|
access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
|
|
2015
2017
|
enable_purge_protection: Optional[bool] = None,
|
|
2016
2018
|
enable_rbac_authorization: Optional[bool] = None,
|
|
@@ -2019,16 +2021,16 @@ class VaultPropertiesResponse(dict):
|
|
|
2019
2021
|
enabled_for_disk_encryption: Optional[bool] = None,
|
|
2020
2022
|
enabled_for_template_deployment: Optional[bool] = None,
|
|
2021
2023
|
network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
|
|
2022
|
-
provisioning_state: Optional[str] = None,
|
|
2023
2024
|
public_network_access: Optional[str] = None,
|
|
2024
|
-
soft_delete_retention_in_days: Optional[int] = None
|
|
2025
|
-
vault_uri: Optional[str] = None):
|
|
2025
|
+
soft_delete_retention_in_days: Optional[int] = None):
|
|
2026
2026
|
"""
|
|
2027
2027
|
Properties of the vault
|
|
2028
2028
|
:param str hsm_pool_resource_id: The resource id of HSM Pool.
|
|
2029
2029
|
:param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
|
|
2030
|
+
:param str provisioning_state: Provisioning state of the vault.
|
|
2030
2031
|
:param 'SkuResponse' sku: SKU details
|
|
2031
2032
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
2033
|
+
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2032
2034
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2033
2035
|
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
2034
2036
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
@@ -2038,15 +2040,15 @@ class VaultPropertiesResponse(dict):
|
|
|
2038
2040
|
:param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
2039
2041
|
:param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
2040
2042
|
:param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
2041
|
-
:param str provisioning_state: Provisioning state of the vault.
|
|
2042
2043
|
:param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
2043
2044
|
:param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
2044
|
-
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2045
2045
|
"""
|
|
2046
2046
|
pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
|
|
2047
2047
|
pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
|
|
2048
|
+
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2048
2049
|
pulumi.set(__self__, "sku", sku)
|
|
2049
2050
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
2051
|
+
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2050
2052
|
if access_policies is not None:
|
|
2051
2053
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
2052
2054
|
if enable_purge_protection is not None:
|
|
@@ -2067,8 +2069,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2067
2069
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
2068
2070
|
if network_acls is not None:
|
|
2069
2071
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
2070
|
-
if provisioning_state is not None:
|
|
2071
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2072
2072
|
if public_network_access is None:
|
|
2073
2073
|
public_network_access = 'enabled'
|
|
2074
2074
|
if public_network_access is not None:
|
|
@@ -2077,8 +2077,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2077
2077
|
soft_delete_retention_in_days = 90
|
|
2078
2078
|
if soft_delete_retention_in_days is not None:
|
|
2079
2079
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
2080
|
-
if vault_uri is not None:
|
|
2081
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2082
2080
|
|
|
2083
2081
|
@property
|
|
2084
2082
|
@pulumi.getter(name="hsmPoolResourceId")
|
|
@@ -2096,6 +2094,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2096
2094
|
"""
|
|
2097
2095
|
return pulumi.get(self, "private_endpoint_connections")
|
|
2098
2096
|
|
|
2097
|
+
@property
|
|
2098
|
+
@pulumi.getter(name="provisioningState")
|
|
2099
|
+
def provisioning_state(self) -> str:
|
|
2100
|
+
"""
|
|
2101
|
+
Provisioning state of the vault.
|
|
2102
|
+
"""
|
|
2103
|
+
return pulumi.get(self, "provisioning_state")
|
|
2104
|
+
|
|
2099
2105
|
@property
|
|
2100
2106
|
@pulumi.getter
|
|
2101
2107
|
def sku(self) -> 'outputs.SkuResponse':
|
|
@@ -2112,6 +2118,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2112
2118
|
"""
|
|
2113
2119
|
return pulumi.get(self, "tenant_id")
|
|
2114
2120
|
|
|
2121
|
+
@property
|
|
2122
|
+
@pulumi.getter(name="vaultUri")
|
|
2123
|
+
def vault_uri(self) -> str:
|
|
2124
|
+
"""
|
|
2125
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
2126
|
+
"""
|
|
2127
|
+
return pulumi.get(self, "vault_uri")
|
|
2128
|
+
|
|
2115
2129
|
@property
|
|
2116
2130
|
@pulumi.getter(name="accessPolicies")
|
|
2117
2131
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
@@ -2177,14 +2191,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2177
2191
|
"""
|
|
2178
2192
|
return pulumi.get(self, "network_acls")
|
|
2179
2193
|
|
|
2180
|
-
@property
|
|
2181
|
-
@pulumi.getter(name="provisioningState")
|
|
2182
|
-
def provisioning_state(self) -> Optional[str]:
|
|
2183
|
-
"""
|
|
2184
|
-
Provisioning state of the vault.
|
|
2185
|
-
"""
|
|
2186
|
-
return pulumi.get(self, "provisioning_state")
|
|
2187
|
-
|
|
2188
2194
|
@property
|
|
2189
2195
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2190
2196
|
def public_network_access(self) -> Optional[str]:
|
|
@@ -2201,14 +2207,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2201
2207
|
"""
|
|
2202
2208
|
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
2203
2209
|
|
|
2204
|
-
@property
|
|
2205
|
-
@pulumi.getter(name="vaultUri")
|
|
2206
|
-
def vault_uri(self) -> Optional[str]:
|
|
2207
|
-
"""
|
|
2208
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2209
|
-
"""
|
|
2210
|
-
return pulumi.get(self, "vault_uri")
|
|
2211
|
-
|
|
2212
2210
|
|
|
2213
2211
|
@pulumi.output_type
|
|
2214
2212
|
class VirtualNetworkRuleResponse(dict):
|
|
@@ -24,7 +24,6 @@ __all__ = [
|
|
|
24
24
|
'SkuFamily',
|
|
25
25
|
'SkuName',
|
|
26
26
|
'StoragePermissions',
|
|
27
|
-
'VaultProvisioningState',
|
|
28
27
|
]
|
|
29
28
|
|
|
30
29
|
|
|
@@ -235,11 +234,3 @@ class StoragePermissions(str, Enum):
|
|
|
235
234
|
LISTSAS = "listsas"
|
|
236
235
|
GETSAS = "getsas"
|
|
237
236
|
DELETESAS = "deletesas"
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
class VaultProvisioningState(str, Enum):
|
|
241
|
-
"""
|
|
242
|
-
Provisioning state of the vault.
|
|
243
|
-
"""
|
|
244
|
-
SUCCEEDED = "Succeeded"
|
|
245
|
-
REGISTERING_DNS = "RegisteringDns"
|
|
@@ -1856,10 +1856,6 @@ if not MYPY:
|
|
|
1856
1856
|
"""
|
|
1857
1857
|
Rules governing the accessibility of the key vault from specific network locations.
|
|
1858
1858
|
"""
|
|
1859
|
-
provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
|
|
1860
|
-
"""
|
|
1861
|
-
Provisioning state of the vault.
|
|
1862
|
-
"""
|
|
1863
1859
|
public_network_access: NotRequired[pulumi.Input[str]]
|
|
1864
1860
|
"""
|
|
1865
1861
|
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
@@ -1868,10 +1864,6 @@ if not MYPY:
|
|
|
1868
1864
|
"""
|
|
1869
1865
|
softDelete data retention days. It accepts >=7 and <=90.
|
|
1870
1866
|
"""
|
|
1871
|
-
vault_uri: NotRequired[pulumi.Input[str]]
|
|
1872
|
-
"""
|
|
1873
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
1874
|
-
"""
|
|
1875
1867
|
elif False:
|
|
1876
1868
|
VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1877
1869
|
|
|
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
|
|
|
1889
1881
|
enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
|
|
1890
1882
|
enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1891
1883
|
network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
|
|
1892
|
-
provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
|
|
1893
1884
|
public_network_access: Optional[pulumi.Input[str]] = None,
|
|
1894
|
-
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None
|
|
1895
|
-
vault_uri: Optional[pulumi.Input[str]] = None):
|
|
1885
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
|
|
1896
1886
|
"""
|
|
1897
1887
|
Properties of the vault
|
|
1898
1888
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
|
|
|
1907
1897
|
:param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1908
1898
|
:param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1909
1899
|
:param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1910
|
-
:param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
|
|
1911
1900
|
:param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1912
1901
|
:param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1913
|
-
:param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1914
1902
|
"""
|
|
1915
1903
|
pulumi.set(__self__, "sku", sku)
|
|
1916
1904
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
@@ -1942,8 +1930,6 @@ class VaultPropertiesArgs:
|
|
|
1942
1930
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1943
1931
|
if network_acls is not None:
|
|
1944
1932
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
1945
|
-
if provisioning_state is not None:
|
|
1946
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1947
1933
|
if public_network_access is None:
|
|
1948
1934
|
public_network_access = 'enabled'
|
|
1949
1935
|
if public_network_access is not None:
|
|
@@ -1952,8 +1938,6 @@ class VaultPropertiesArgs:
|
|
|
1952
1938
|
soft_delete_retention_in_days = 90
|
|
1953
1939
|
if soft_delete_retention_in_days is not None:
|
|
1954
1940
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1955
|
-
if vault_uri is not None:
|
|
1956
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1957
1941
|
|
|
1958
1942
|
@property
|
|
1959
1943
|
@pulumi.getter
|
|
@@ -2088,18 +2072,6 @@ class VaultPropertiesArgs:
|
|
|
2088
2072
|
def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
|
|
2089
2073
|
pulumi.set(self, "network_acls", value)
|
|
2090
2074
|
|
|
2091
|
-
@property
|
|
2092
|
-
@pulumi.getter(name="provisioningState")
|
|
2093
|
-
def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
|
|
2094
|
-
"""
|
|
2095
|
-
Provisioning state of the vault.
|
|
2096
|
-
"""
|
|
2097
|
-
return pulumi.get(self, "provisioning_state")
|
|
2098
|
-
|
|
2099
|
-
@provisioning_state.setter
|
|
2100
|
-
def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
|
|
2101
|
-
pulumi.set(self, "provisioning_state", value)
|
|
2102
|
-
|
|
2103
2075
|
@property
|
|
2104
2076
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2105
2077
|
def public_network_access(self) -> Optional[pulumi.Input[str]]:
|
|
@@ -2124,18 +2096,6 @@ class VaultPropertiesArgs:
|
|
|
2124
2096
|
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
2125
2097
|
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
2126
2098
|
|
|
2127
|
-
@property
|
|
2128
|
-
@pulumi.getter(name="vaultUri")
|
|
2129
|
-
def vault_uri(self) -> Optional[pulumi.Input[str]]:
|
|
2130
|
-
"""
|
|
2131
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2132
|
-
"""
|
|
2133
|
-
return pulumi.get(self, "vault_uri")
|
|
2134
|
-
|
|
2135
|
-
@vault_uri.setter
|
|
2136
|
-
def vault_uri(self, value: Optional[pulumi.Input[str]]):
|
|
2137
|
-
pulumi.set(self, "vault_uri", value)
|
|
2138
|
-
|
|
2139
2099
|
|
|
2140
2100
|
if not MYPY:
|
|
2141
2101
|
class VirtualNetworkRuleArgsDict(TypedDict):
|