pulumi-azure-native 2.88.0a1739514756__py3-none-any.whl → 2.89.0a1740591573__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure-native might be problematic. Click here for more details.

Files changed (52) hide show
  1. pulumi_azure_native/__init__.py +2 -0
  2. pulumi_azure_native/authorization/__init__.py +2 -0
  3. pulumi_azure_native/authorization/_enums.py +26 -0
  4. pulumi_azure_native/authorization/_inputs.py +194 -0
  5. pulumi_azure_native/authorization/get_management_lock_at_resource_level.py +8 -2
  6. pulumi_azure_native/authorization/get_pim_role_eligibility_schedule.py +355 -0
  7. pulumi_azure_native/authorization/management_lock_at_resource_level.py +21 -0
  8. pulumi_azure_native/authorization/outputs.py +445 -0
  9. pulumi_azure_native/authorization/pim_role_eligibility_schedule.py +511 -0
  10. pulumi_azure_native/authorization/v20200501/get_management_lock_at_resource_level.py +8 -2
  11. pulumi_azure_native/authorization/v20200501/management_lock_at_resource_level.py +21 -0
  12. pulumi_azure_native/authorization/v20201001/__init__.py +2 -0
  13. pulumi_azure_native/authorization/v20201001/_enums.py +26 -0
  14. pulumi_azure_native/authorization/v20201001/_inputs.py +194 -0
  15. pulumi_azure_native/authorization/v20201001/get_pim_role_eligibility_schedule.py +353 -0
  16. pulumi_azure_native/authorization/v20201001/outputs.py +445 -0
  17. pulumi_azure_native/authorization/v20201001/pim_role_eligibility_schedule.py +523 -0
  18. pulumi_azure_native/keyvault/_enums.py +0 -9
  19. pulumi_azure_native/keyvault/_inputs.py +1 -41
  20. pulumi_azure_native/keyvault/outputs.py +27 -29
  21. pulumi_azure_native/keyvault/v20230201/_enums.py +0 -9
  22. pulumi_azure_native/keyvault/v20230201/_inputs.py +1 -41
  23. pulumi_azure_native/keyvault/v20230201/outputs.py +27 -29
  24. pulumi_azure_native/keyvault/v20230701/_enums.py +0 -9
  25. pulumi_azure_native/keyvault/v20230701/_inputs.py +1 -41
  26. pulumi_azure_native/keyvault/v20230701/outputs.py +27 -29
  27. pulumi_azure_native/keyvault/v20240401preview/_enums.py +0 -9
  28. pulumi_azure_native/keyvault/v20240401preview/_inputs.py +1 -41
  29. pulumi_azure_native/keyvault/v20240401preview/outputs.py +27 -29
  30. pulumi_azure_native/keyvault/v20241101/_enums.py +0 -9
  31. pulumi_azure_native/keyvault/v20241101/_inputs.py +1 -41
  32. pulumi_azure_native/keyvault/v20241101/outputs.py +27 -29
  33. pulumi_azure_native/keyvault/v20241201preview/_enums.py +0 -9
  34. pulumi_azure_native/keyvault/v20241201preview/_inputs.py +1 -41
  35. pulumi_azure_native/keyvault/v20241201preview/outputs.py +27 -29
  36. pulumi_azure_native/pulumi-plugin.json +1 -1
  37. pulumi_azure_native/resources/get_resource.py +8 -2
  38. pulumi_azure_native/resources/resource.py +21 -0
  39. pulumi_azure_native/resources/v20220901/get_resource.py +8 -2
  40. pulumi_azure_native/resources/v20220901/resource.py +21 -0
  41. pulumi_azure_native/resources/v20230701/get_resource.py +8 -2
  42. pulumi_azure_native/resources/v20230701/resource.py +21 -0
  43. pulumi_azure_native/resources/v20240301/get_resource.py +8 -2
  44. pulumi_azure_native/resources/v20240301/resource.py +21 -0
  45. pulumi_azure_native/resources/v20240701/get_resource.py +8 -2
  46. pulumi_azure_native/resources/v20240701/resource.py +21 -0
  47. pulumi_azure_native/resources/v20241101/get_resource.py +8 -2
  48. pulumi_azure_native/resources/v20241101/resource.py +21 -0
  49. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/METADATA +1 -1
  50. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/RECORD +52 -48
  51. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/WHEEL +1 -1
  52. {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/top_level.txt +0 -0
@@ -1975,8 +1975,12 @@ class VaultPropertiesResponse(dict):
1975
1975
  suggest = "hsm_pool_resource_id"
1976
1976
  elif key == "privateEndpointConnections":
1977
1977
  suggest = "private_endpoint_connections"
1978
+ elif key == "provisioningState":
1979
+ suggest = "provisioning_state"
1978
1980
  elif key == "tenantId":
1979
1981
  suggest = "tenant_id"
1982
+ elif key == "vaultUri":
1983
+ suggest = "vault_uri"
1980
1984
  elif key == "accessPolicies":
1981
1985
  suggest = "access_policies"
1982
1986
  elif key == "enablePurgeProtection":
@@ -1993,14 +1997,10 @@ class VaultPropertiesResponse(dict):
1993
1997
  suggest = "enabled_for_template_deployment"
1994
1998
  elif key == "networkAcls":
1995
1999
  suggest = "network_acls"
1996
- elif key == "provisioningState":
1997
- suggest = "provisioning_state"
1998
2000
  elif key == "publicNetworkAccess":
1999
2001
  suggest = "public_network_access"
2000
2002
  elif key == "softDeleteRetentionInDays":
2001
2003
  suggest = "soft_delete_retention_in_days"
2002
- elif key == "vaultUri":
2003
- suggest = "vault_uri"
2004
2004
 
2005
2005
  if suggest:
2006
2006
  pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
@@ -2016,8 +2016,10 @@ class VaultPropertiesResponse(dict):
2016
2016
  def __init__(__self__, *,
2017
2017
  hsm_pool_resource_id: str,
2018
2018
  private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
2019
+ provisioning_state: str,
2019
2020
  sku: 'outputs.SkuResponse',
2020
2021
  tenant_id: str,
2022
+ vault_uri: str,
2021
2023
  access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
2022
2024
  enable_purge_protection: Optional[bool] = None,
2023
2025
  enable_rbac_authorization: Optional[bool] = None,
@@ -2026,16 +2028,16 @@ class VaultPropertiesResponse(dict):
2026
2028
  enabled_for_disk_encryption: Optional[bool] = None,
2027
2029
  enabled_for_template_deployment: Optional[bool] = None,
2028
2030
  network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
2029
- provisioning_state: Optional[str] = None,
2030
2031
  public_network_access: Optional[str] = None,
2031
- soft_delete_retention_in_days: Optional[int] = None,
2032
- vault_uri: Optional[str] = None):
2032
+ soft_delete_retention_in_days: Optional[int] = None):
2033
2033
  """
2034
2034
  Properties of the vault
2035
2035
  :param str hsm_pool_resource_id: The resource id of HSM Pool.
2036
2036
  :param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
2037
+ :param str provisioning_state: Provisioning state of the vault.
2037
2038
  :param 'SkuResponse' sku: SKU details
2038
2039
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
2040
+ :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2039
2041
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
2040
2042
  These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
2041
2043
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
@@ -2045,15 +2047,15 @@ class VaultPropertiesResponse(dict):
2045
2047
  :param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
2046
2048
  :param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
2047
2049
  :param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
2048
- :param str provisioning_state: Provisioning state of the vault.
2049
2050
  :param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
2050
2051
  :param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
2051
- :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
2052
2052
  """
2053
2053
  pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
2054
2054
  pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
2055
+ pulumi.set(__self__, "provisioning_state", provisioning_state)
2055
2056
  pulumi.set(__self__, "sku", sku)
2056
2057
  pulumi.set(__self__, "tenant_id", tenant_id)
2058
+ pulumi.set(__self__, "vault_uri", vault_uri)
2057
2059
  if access_policies is not None:
2058
2060
  pulumi.set(__self__, "access_policies", access_policies)
2059
2061
  if enable_purge_protection is not None:
@@ -2074,8 +2076,6 @@ class VaultPropertiesResponse(dict):
2074
2076
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
2075
2077
  if network_acls is not None:
2076
2078
  pulumi.set(__self__, "network_acls", network_acls)
2077
- if provisioning_state is not None:
2078
- pulumi.set(__self__, "provisioning_state", provisioning_state)
2079
2079
  if public_network_access is None:
2080
2080
  public_network_access = 'enabled'
2081
2081
  if public_network_access is not None:
@@ -2084,8 +2084,6 @@ class VaultPropertiesResponse(dict):
2084
2084
  soft_delete_retention_in_days = 90
2085
2085
  if soft_delete_retention_in_days is not None:
2086
2086
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
2087
- if vault_uri is not None:
2088
- pulumi.set(__self__, "vault_uri", vault_uri)
2089
2087
 
2090
2088
  @property
2091
2089
  @pulumi.getter(name="hsmPoolResourceId")
@@ -2103,6 +2101,14 @@ class VaultPropertiesResponse(dict):
2103
2101
  """
2104
2102
  return pulumi.get(self, "private_endpoint_connections")
2105
2103
 
2104
+ @property
2105
+ @pulumi.getter(name="provisioningState")
2106
+ def provisioning_state(self) -> str:
2107
+ """
2108
+ Provisioning state of the vault.
2109
+ """
2110
+ return pulumi.get(self, "provisioning_state")
2111
+
2106
2112
  @property
2107
2113
  @pulumi.getter
2108
2114
  def sku(self) -> 'outputs.SkuResponse':
@@ -2119,6 +2125,14 @@ class VaultPropertiesResponse(dict):
2119
2125
  """
2120
2126
  return pulumi.get(self, "tenant_id")
2121
2127
 
2128
+ @property
2129
+ @pulumi.getter(name="vaultUri")
2130
+ def vault_uri(self) -> str:
2131
+ """
2132
+ The URI of the vault for performing operations on keys and secrets.
2133
+ """
2134
+ return pulumi.get(self, "vault_uri")
2135
+
2122
2136
  @property
2123
2137
  @pulumi.getter(name="accessPolicies")
2124
2138
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
@@ -2184,14 +2198,6 @@ class VaultPropertiesResponse(dict):
2184
2198
  """
2185
2199
  return pulumi.get(self, "network_acls")
2186
2200
 
2187
- @property
2188
- @pulumi.getter(name="provisioningState")
2189
- def provisioning_state(self) -> Optional[str]:
2190
- """
2191
- Provisioning state of the vault.
2192
- """
2193
- return pulumi.get(self, "provisioning_state")
2194
-
2195
2201
  @property
2196
2202
  @pulumi.getter(name="publicNetworkAccess")
2197
2203
  def public_network_access(self) -> Optional[str]:
@@ -2208,14 +2214,6 @@ class VaultPropertiesResponse(dict):
2208
2214
  """
2209
2215
  return pulumi.get(self, "soft_delete_retention_in_days")
2210
2216
 
2211
- @property
2212
- @pulumi.getter(name="vaultUri")
2213
- def vault_uri(self) -> Optional[str]:
2214
- """
2215
- The URI of the vault for performing operations on keys and secrets.
2216
- """
2217
- return pulumi.get(self, "vault_uri")
2218
-
2219
2217
 
2220
2218
  @pulumi.output_type
2221
2219
  class VirtualNetworkRuleResponse(dict):
@@ -23,7 +23,6 @@ __all__ = [
23
23
  'SkuFamily',
24
24
  'SkuName',
25
25
  'StoragePermissions',
26
- 'VaultProvisioningState',
27
26
  ]
28
27
 
29
28
 
@@ -227,11 +226,3 @@ class StoragePermissions(str, Enum):
227
226
  LISTSAS = "listsas"
228
227
  GETSAS = "getsas"
229
228
  DELETESAS = "deletesas"
230
-
231
-
232
- class VaultProvisioningState(str, Enum):
233
- """
234
- Provisioning state of the vault.
235
- """
236
- SUCCEEDED = "Succeeded"
237
- REGISTERING_DNS = "RegisteringDns"
@@ -1799,10 +1799,6 @@ if not MYPY:
1799
1799
  """
1800
1800
  Rules governing the accessibility of the key vault from specific network locations.
1801
1801
  """
1802
- provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
1803
- """
1804
- Provisioning state of the vault.
1805
- """
1806
1802
  public_network_access: NotRequired[pulumi.Input[str]]
1807
1803
  """
1808
1804
  Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
@@ -1811,10 +1807,6 @@ if not MYPY:
1811
1807
  """
1812
1808
  softDelete data retention days. It accepts >=7 and <=90.
1813
1809
  """
1814
- vault_uri: NotRequired[pulumi.Input[str]]
1815
- """
1816
- The URI of the vault for performing operations on keys and secrets.
1817
- """
1818
1810
  elif False:
1819
1811
  VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
1820
1812
 
@@ -1832,10 +1824,8 @@ class VaultPropertiesArgs:
1832
1824
  enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
1833
1825
  enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
1834
1826
  network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
1835
- provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
1836
1827
  public_network_access: Optional[pulumi.Input[str]] = None,
1837
- soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
1838
- vault_uri: Optional[pulumi.Input[str]] = None):
1828
+ soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
1839
1829
  """
1840
1830
  Properties of the vault
1841
1831
  :param pulumi.Input['SkuArgs'] sku: SKU details
@@ -1850,10 +1840,8 @@ class VaultPropertiesArgs:
1850
1840
  :param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
1851
1841
  :param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
1852
1842
  :param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
1853
- :param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
1854
1843
  :param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
1855
1844
  :param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
1856
- :param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
1857
1845
  """
1858
1846
  pulumi.set(__self__, "sku", sku)
1859
1847
  pulumi.set(__self__, "tenant_id", tenant_id)
@@ -1879,8 +1867,6 @@ class VaultPropertiesArgs:
1879
1867
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
1880
1868
  if network_acls is not None:
1881
1869
  pulumi.set(__self__, "network_acls", network_acls)
1882
- if provisioning_state is not None:
1883
- pulumi.set(__self__, "provisioning_state", provisioning_state)
1884
1870
  if public_network_access is None:
1885
1871
  public_network_access = 'enabled'
1886
1872
  if public_network_access is not None:
@@ -1889,8 +1875,6 @@ class VaultPropertiesArgs:
1889
1875
  soft_delete_retention_in_days = 90
1890
1876
  if soft_delete_retention_in_days is not None:
1891
1877
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
1892
- if vault_uri is not None:
1893
- pulumi.set(__self__, "vault_uri", vault_uri)
1894
1878
 
1895
1879
  @property
1896
1880
  @pulumi.getter
@@ -2025,18 +2009,6 @@ class VaultPropertiesArgs:
2025
2009
  def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
2026
2010
  pulumi.set(self, "network_acls", value)
2027
2011
 
2028
- @property
2029
- @pulumi.getter(name="provisioningState")
2030
- def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
2031
- """
2032
- Provisioning state of the vault.
2033
- """
2034
- return pulumi.get(self, "provisioning_state")
2035
-
2036
- @provisioning_state.setter
2037
- def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
2038
- pulumi.set(self, "provisioning_state", value)
2039
-
2040
2012
  @property
2041
2013
  @pulumi.getter(name="publicNetworkAccess")
2042
2014
  def public_network_access(self) -> Optional[pulumi.Input[str]]:
@@ -2061,18 +2033,6 @@ class VaultPropertiesArgs:
2061
2033
  def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
2062
2034
  pulumi.set(self, "soft_delete_retention_in_days", value)
2063
2035
 
2064
- @property
2065
- @pulumi.getter(name="vaultUri")
2066
- def vault_uri(self) -> Optional[pulumi.Input[str]]:
2067
- """
2068
- The URI of the vault for performing operations on keys and secrets.
2069
- """
2070
- return pulumi.get(self, "vault_uri")
2071
-
2072
- @vault_uri.setter
2073
- def vault_uri(self, value: Optional[pulumi.Input[str]]):
2074
- pulumi.set(self, "vault_uri", value)
2075
-
2076
2036
 
2077
2037
  if not MYPY:
2078
2038
  class VirtualNetworkRuleArgsDict(TypedDict):
@@ -1837,8 +1837,12 @@ class VaultPropertiesResponse(dict):
1837
1837
  suggest = "hsm_pool_resource_id"
1838
1838
  elif key == "privateEndpointConnections":
1839
1839
  suggest = "private_endpoint_connections"
1840
+ elif key == "provisioningState":
1841
+ suggest = "provisioning_state"
1840
1842
  elif key == "tenantId":
1841
1843
  suggest = "tenant_id"
1844
+ elif key == "vaultUri":
1845
+ suggest = "vault_uri"
1842
1846
  elif key == "accessPolicies":
1843
1847
  suggest = "access_policies"
1844
1848
  elif key == "enablePurgeProtection":
@@ -1855,14 +1859,10 @@ class VaultPropertiesResponse(dict):
1855
1859
  suggest = "enabled_for_template_deployment"
1856
1860
  elif key == "networkAcls":
1857
1861
  suggest = "network_acls"
1858
- elif key == "provisioningState":
1859
- suggest = "provisioning_state"
1860
1862
  elif key == "publicNetworkAccess":
1861
1863
  suggest = "public_network_access"
1862
1864
  elif key == "softDeleteRetentionInDays":
1863
1865
  suggest = "soft_delete_retention_in_days"
1864
- elif key == "vaultUri":
1865
- suggest = "vault_uri"
1866
1866
 
1867
1867
  if suggest:
1868
1868
  pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
@@ -1878,8 +1878,10 @@ class VaultPropertiesResponse(dict):
1878
1878
  def __init__(__self__, *,
1879
1879
  hsm_pool_resource_id: str,
1880
1880
  private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
1881
+ provisioning_state: str,
1881
1882
  sku: 'outputs.SkuResponse',
1882
1883
  tenant_id: str,
1884
+ vault_uri: str,
1883
1885
  access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
1884
1886
  enable_purge_protection: Optional[bool] = None,
1885
1887
  enable_rbac_authorization: Optional[bool] = None,
@@ -1888,16 +1890,16 @@ class VaultPropertiesResponse(dict):
1888
1890
  enabled_for_disk_encryption: Optional[bool] = None,
1889
1891
  enabled_for_template_deployment: Optional[bool] = None,
1890
1892
  network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
1891
- provisioning_state: Optional[str] = None,
1892
1893
  public_network_access: Optional[str] = None,
1893
- soft_delete_retention_in_days: Optional[int] = None,
1894
- vault_uri: Optional[str] = None):
1894
+ soft_delete_retention_in_days: Optional[int] = None):
1895
1895
  """
1896
1896
  Properties of the vault
1897
1897
  :param str hsm_pool_resource_id: The resource id of HSM Pool.
1898
1898
  :param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
1899
+ :param str provisioning_state: Provisioning state of the vault.
1899
1900
  :param 'SkuResponse' sku: SKU details
1900
1901
  :param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
1902
+ :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
1901
1903
  :param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
1902
1904
  These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
1903
1905
  :param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
@@ -1907,15 +1909,15 @@ class VaultPropertiesResponse(dict):
1907
1909
  :param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
1908
1910
  :param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
1909
1911
  :param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
1910
- :param str provisioning_state: Provisioning state of the vault.
1911
1912
  :param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
1912
1913
  :param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
1913
- :param str vault_uri: The URI of the vault for performing operations on keys and secrets.
1914
1914
  """
1915
1915
  pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
1916
1916
  pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
1917
+ pulumi.set(__self__, "provisioning_state", provisioning_state)
1917
1918
  pulumi.set(__self__, "sku", sku)
1918
1919
  pulumi.set(__self__, "tenant_id", tenant_id)
1920
+ pulumi.set(__self__, "vault_uri", vault_uri)
1919
1921
  if access_policies is not None:
1920
1922
  pulumi.set(__self__, "access_policies", access_policies)
1921
1923
  if enable_purge_protection is not None:
@@ -1936,8 +1938,6 @@ class VaultPropertiesResponse(dict):
1936
1938
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
1937
1939
  if network_acls is not None:
1938
1940
  pulumi.set(__self__, "network_acls", network_acls)
1939
- if provisioning_state is not None:
1940
- pulumi.set(__self__, "provisioning_state", provisioning_state)
1941
1941
  if public_network_access is None:
1942
1942
  public_network_access = 'enabled'
1943
1943
  if public_network_access is not None:
@@ -1946,8 +1946,6 @@ class VaultPropertiesResponse(dict):
1946
1946
  soft_delete_retention_in_days = 90
1947
1947
  if soft_delete_retention_in_days is not None:
1948
1948
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
1949
- if vault_uri is not None:
1950
- pulumi.set(__self__, "vault_uri", vault_uri)
1951
1949
 
1952
1950
  @property
1953
1951
  @pulumi.getter(name="hsmPoolResourceId")
@@ -1965,6 +1963,14 @@ class VaultPropertiesResponse(dict):
1965
1963
  """
1966
1964
  return pulumi.get(self, "private_endpoint_connections")
1967
1965
 
1966
+ @property
1967
+ @pulumi.getter(name="provisioningState")
1968
+ def provisioning_state(self) -> str:
1969
+ """
1970
+ Provisioning state of the vault.
1971
+ """
1972
+ return pulumi.get(self, "provisioning_state")
1973
+
1968
1974
  @property
1969
1975
  @pulumi.getter
1970
1976
  def sku(self) -> 'outputs.SkuResponse':
@@ -1981,6 +1987,14 @@ class VaultPropertiesResponse(dict):
1981
1987
  """
1982
1988
  return pulumi.get(self, "tenant_id")
1983
1989
 
1990
+ @property
1991
+ @pulumi.getter(name="vaultUri")
1992
+ def vault_uri(self) -> str:
1993
+ """
1994
+ The URI of the vault for performing operations on keys and secrets.
1995
+ """
1996
+ return pulumi.get(self, "vault_uri")
1997
+
1984
1998
  @property
1985
1999
  @pulumi.getter(name="accessPolicies")
1986
2000
  def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
@@ -2046,14 +2060,6 @@ class VaultPropertiesResponse(dict):
2046
2060
  """
2047
2061
  return pulumi.get(self, "network_acls")
2048
2062
 
2049
- @property
2050
- @pulumi.getter(name="provisioningState")
2051
- def provisioning_state(self) -> Optional[str]:
2052
- """
2053
- Provisioning state of the vault.
2054
- """
2055
- return pulumi.get(self, "provisioning_state")
2056
-
2057
2063
  @property
2058
2064
  @pulumi.getter(name="publicNetworkAccess")
2059
2065
  def public_network_access(self) -> Optional[str]:
@@ -2070,14 +2076,6 @@ class VaultPropertiesResponse(dict):
2070
2076
  """
2071
2077
  return pulumi.get(self, "soft_delete_retention_in_days")
2072
2078
 
2073
- @property
2074
- @pulumi.getter(name="vaultUri")
2075
- def vault_uri(self) -> Optional[str]:
2076
- """
2077
- The URI of the vault for performing operations on keys and secrets.
2078
- """
2079
- return pulumi.get(self, "vault_uri")
2080
-
2081
2079
 
2082
2080
  @pulumi.output_type
2083
2081
  class VirtualNetworkRuleResponse(dict):
@@ -24,7 +24,6 @@ __all__ = [
24
24
  'SkuFamily',
25
25
  'SkuName',
26
26
  'StoragePermissions',
27
- 'VaultProvisioningState',
28
27
  ]
29
28
 
30
29
 
@@ -232,11 +231,3 @@ class StoragePermissions(str, Enum):
232
231
  LISTSAS = "listsas"
233
232
  GETSAS = "getsas"
234
233
  DELETESAS = "deletesas"
235
-
236
-
237
- class VaultProvisioningState(str, Enum):
238
- """
239
- Provisioning state of the vault.
240
- """
241
- SUCCEEDED = "Succeeded"
242
- REGISTERING_DNS = "RegisteringDns"
@@ -1856,10 +1856,6 @@ if not MYPY:
1856
1856
  """
1857
1857
  Rules governing the accessibility of the key vault from specific network locations.
1858
1858
  """
1859
- provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
1860
- """
1861
- Provisioning state of the vault.
1862
- """
1863
1859
  public_network_access: NotRequired[pulumi.Input[str]]
1864
1860
  """
1865
1861
  Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
@@ -1868,10 +1864,6 @@ if not MYPY:
1868
1864
  """
1869
1865
  softDelete data retention days. It accepts >=7 and <=90.
1870
1866
  """
1871
- vault_uri: NotRequired[pulumi.Input[str]]
1872
- """
1873
- The URI of the vault for performing operations on keys and secrets.
1874
- """
1875
1867
  elif False:
1876
1868
  VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
1877
1869
 
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
1889
1881
  enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
1890
1882
  enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
1891
1883
  network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
1892
- provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
1893
1884
  public_network_access: Optional[pulumi.Input[str]] = None,
1894
- soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None,
1895
- vault_uri: Optional[pulumi.Input[str]] = None):
1885
+ soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
1896
1886
  """
1897
1887
  Properties of the vault
1898
1888
  :param pulumi.Input['SkuArgs'] sku: SKU details
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
1907
1897
  :param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
1908
1898
  :param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
1909
1899
  :param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
1910
- :param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
1911
1900
  :param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
1912
1901
  :param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
1913
- :param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
1914
1902
  """
1915
1903
  pulumi.set(__self__, "sku", sku)
1916
1904
  pulumi.set(__self__, "tenant_id", tenant_id)
@@ -1936,8 +1924,6 @@ class VaultPropertiesArgs:
1936
1924
  pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
1937
1925
  if network_acls is not None:
1938
1926
  pulumi.set(__self__, "network_acls", network_acls)
1939
- if provisioning_state is not None:
1940
- pulumi.set(__self__, "provisioning_state", provisioning_state)
1941
1927
  if public_network_access is None:
1942
1928
  public_network_access = 'enabled'
1943
1929
  if public_network_access is not None:
@@ -1946,8 +1932,6 @@ class VaultPropertiesArgs:
1946
1932
  soft_delete_retention_in_days = 90
1947
1933
  if soft_delete_retention_in_days is not None:
1948
1934
  pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
1949
- if vault_uri is not None:
1950
- pulumi.set(__self__, "vault_uri", vault_uri)
1951
1935
 
1952
1936
  @property
1953
1937
  @pulumi.getter
@@ -2082,18 +2066,6 @@ class VaultPropertiesArgs:
2082
2066
  def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
2083
2067
  pulumi.set(self, "network_acls", value)
2084
2068
 
2085
- @property
2086
- @pulumi.getter(name="provisioningState")
2087
- def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
2088
- """
2089
- Provisioning state of the vault.
2090
- """
2091
- return pulumi.get(self, "provisioning_state")
2092
-
2093
- @provisioning_state.setter
2094
- def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
2095
- pulumi.set(self, "provisioning_state", value)
2096
-
2097
2069
  @property
2098
2070
  @pulumi.getter(name="publicNetworkAccess")
2099
2071
  def public_network_access(self) -> Optional[pulumi.Input[str]]:
@@ -2118,18 +2090,6 @@ class VaultPropertiesArgs:
2118
2090
  def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
2119
2091
  pulumi.set(self, "soft_delete_retention_in_days", value)
2120
2092
 
2121
- @property
2122
- @pulumi.getter(name="vaultUri")
2123
- def vault_uri(self) -> Optional[pulumi.Input[str]]:
2124
- """
2125
- The URI of the vault for performing operations on keys and secrets.
2126
- """
2127
- return pulumi.get(self, "vault_uri")
2128
-
2129
- @vault_uri.setter
2130
- def vault_uri(self, value: Optional[pulumi.Input[str]]):
2131
- pulumi.set(self, "vault_uri", value)
2132
-
2133
2093
 
2134
2094
  if not MYPY:
2135
2095
  class VirtualNetworkRuleArgsDict(TypedDict):