pulumi-azure-native 2.88.0a1739514756__py3-none-any.whl → 2.89.0a1740591573__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +2 -0
- pulumi_azure_native/authorization/__init__.py +2 -0
- pulumi_azure_native/authorization/_enums.py +26 -0
- pulumi_azure_native/authorization/_inputs.py +194 -0
- pulumi_azure_native/authorization/get_management_lock_at_resource_level.py +8 -2
- pulumi_azure_native/authorization/get_pim_role_eligibility_schedule.py +355 -0
- pulumi_azure_native/authorization/management_lock_at_resource_level.py +21 -0
- pulumi_azure_native/authorization/outputs.py +445 -0
- pulumi_azure_native/authorization/pim_role_eligibility_schedule.py +511 -0
- pulumi_azure_native/authorization/v20200501/get_management_lock_at_resource_level.py +8 -2
- pulumi_azure_native/authorization/v20200501/management_lock_at_resource_level.py +21 -0
- pulumi_azure_native/authorization/v20201001/__init__.py +2 -0
- pulumi_azure_native/authorization/v20201001/_enums.py +26 -0
- pulumi_azure_native/authorization/v20201001/_inputs.py +194 -0
- pulumi_azure_native/authorization/v20201001/get_pim_role_eligibility_schedule.py +353 -0
- pulumi_azure_native/authorization/v20201001/outputs.py +445 -0
- pulumi_azure_native/authorization/v20201001/pim_role_eligibility_schedule.py +523 -0
- pulumi_azure_native/keyvault/_enums.py +0 -9
- pulumi_azure_native/keyvault/_inputs.py +1 -41
- pulumi_azure_native/keyvault/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20230201/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20230201/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20230201/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20230701/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20230701/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20230701/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20240401preview/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20240401preview/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20240401preview/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20241101/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20241101/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20241101/outputs.py +27 -29
- pulumi_azure_native/keyvault/v20241201preview/_enums.py +0 -9
- pulumi_azure_native/keyvault/v20241201preview/_inputs.py +1 -41
- pulumi_azure_native/keyvault/v20241201preview/outputs.py +27 -29
- pulumi_azure_native/pulumi-plugin.json +1 -1
- pulumi_azure_native/resources/get_resource.py +8 -2
- pulumi_azure_native/resources/resource.py +21 -0
- pulumi_azure_native/resources/v20220901/get_resource.py +8 -2
- pulumi_azure_native/resources/v20220901/resource.py +21 -0
- pulumi_azure_native/resources/v20230701/get_resource.py +8 -2
- pulumi_azure_native/resources/v20230701/resource.py +21 -0
- pulumi_azure_native/resources/v20240301/get_resource.py +8 -2
- pulumi_azure_native/resources/v20240301/resource.py +21 -0
- pulumi_azure_native/resources/v20240701/get_resource.py +8 -2
- pulumi_azure_native/resources/v20240701/resource.py +21 -0
- pulumi_azure_native/resources/v20241101/get_resource.py +8 -2
- pulumi_azure_native/resources/v20241101/resource.py +21 -0
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/RECORD +52 -48
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/WHEEL +1 -1
- {pulumi_azure_native-2.88.0a1739514756.dist-info → pulumi_azure_native-2.89.0a1740591573.dist-info}/top_level.txt +0 -0
|
@@ -1975,8 +1975,12 @@ class VaultPropertiesResponse(dict):
|
|
|
1975
1975
|
suggest = "hsm_pool_resource_id"
|
|
1976
1976
|
elif key == "privateEndpointConnections":
|
|
1977
1977
|
suggest = "private_endpoint_connections"
|
|
1978
|
+
elif key == "provisioningState":
|
|
1979
|
+
suggest = "provisioning_state"
|
|
1978
1980
|
elif key == "tenantId":
|
|
1979
1981
|
suggest = "tenant_id"
|
|
1982
|
+
elif key == "vaultUri":
|
|
1983
|
+
suggest = "vault_uri"
|
|
1980
1984
|
elif key == "accessPolicies":
|
|
1981
1985
|
suggest = "access_policies"
|
|
1982
1986
|
elif key == "enablePurgeProtection":
|
|
@@ -1993,14 +1997,10 @@ class VaultPropertiesResponse(dict):
|
|
|
1993
1997
|
suggest = "enabled_for_template_deployment"
|
|
1994
1998
|
elif key == "networkAcls":
|
|
1995
1999
|
suggest = "network_acls"
|
|
1996
|
-
elif key == "provisioningState":
|
|
1997
|
-
suggest = "provisioning_state"
|
|
1998
2000
|
elif key == "publicNetworkAccess":
|
|
1999
2001
|
suggest = "public_network_access"
|
|
2000
2002
|
elif key == "softDeleteRetentionInDays":
|
|
2001
2003
|
suggest = "soft_delete_retention_in_days"
|
|
2002
|
-
elif key == "vaultUri":
|
|
2003
|
-
suggest = "vault_uri"
|
|
2004
2004
|
|
|
2005
2005
|
if suggest:
|
|
2006
2006
|
pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -2016,8 +2016,10 @@ class VaultPropertiesResponse(dict):
|
|
|
2016
2016
|
def __init__(__self__, *,
|
|
2017
2017
|
hsm_pool_resource_id: str,
|
|
2018
2018
|
private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
|
|
2019
|
+
provisioning_state: str,
|
|
2019
2020
|
sku: 'outputs.SkuResponse',
|
|
2020
2021
|
tenant_id: str,
|
|
2022
|
+
vault_uri: str,
|
|
2021
2023
|
access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
|
|
2022
2024
|
enable_purge_protection: Optional[bool] = None,
|
|
2023
2025
|
enable_rbac_authorization: Optional[bool] = None,
|
|
@@ -2026,16 +2028,16 @@ class VaultPropertiesResponse(dict):
|
|
|
2026
2028
|
enabled_for_disk_encryption: Optional[bool] = None,
|
|
2027
2029
|
enabled_for_template_deployment: Optional[bool] = None,
|
|
2028
2030
|
network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
|
|
2029
|
-
provisioning_state: Optional[str] = None,
|
|
2030
2031
|
public_network_access: Optional[str] = None,
|
|
2031
|
-
soft_delete_retention_in_days: Optional[int] = None
|
|
2032
|
-
vault_uri: Optional[str] = None):
|
|
2032
|
+
soft_delete_retention_in_days: Optional[int] = None):
|
|
2033
2033
|
"""
|
|
2034
2034
|
Properties of the vault
|
|
2035
2035
|
:param str hsm_pool_resource_id: The resource id of HSM Pool.
|
|
2036
2036
|
:param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
|
|
2037
|
+
:param str provisioning_state: Provisioning state of the vault.
|
|
2037
2038
|
:param 'SkuResponse' sku: SKU details
|
|
2038
2039
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
2040
|
+
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2039
2041
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
2040
2042
|
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
2041
2043
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
@@ -2045,15 +2047,15 @@ class VaultPropertiesResponse(dict):
|
|
|
2045
2047
|
:param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
2046
2048
|
:param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
2047
2049
|
:param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
2048
|
-
:param str provisioning_state: Provisioning state of the vault.
|
|
2049
2050
|
:param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
2050
2051
|
:param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
2051
|
-
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
2052
2052
|
"""
|
|
2053
2053
|
pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
|
|
2054
2054
|
pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
|
|
2055
|
+
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2055
2056
|
pulumi.set(__self__, "sku", sku)
|
|
2056
2057
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
2058
|
+
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2057
2059
|
if access_policies is not None:
|
|
2058
2060
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
2059
2061
|
if enable_purge_protection is not None:
|
|
@@ -2074,8 +2076,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2074
2076
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
2075
2077
|
if network_acls is not None:
|
|
2076
2078
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
2077
|
-
if provisioning_state is not None:
|
|
2078
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
2079
2079
|
if public_network_access is None:
|
|
2080
2080
|
public_network_access = 'enabled'
|
|
2081
2081
|
if public_network_access is not None:
|
|
@@ -2084,8 +2084,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2084
2084
|
soft_delete_retention_in_days = 90
|
|
2085
2085
|
if soft_delete_retention_in_days is not None:
|
|
2086
2086
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
2087
|
-
if vault_uri is not None:
|
|
2088
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
2089
2087
|
|
|
2090
2088
|
@property
|
|
2091
2089
|
@pulumi.getter(name="hsmPoolResourceId")
|
|
@@ -2103,6 +2101,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2103
2101
|
"""
|
|
2104
2102
|
return pulumi.get(self, "private_endpoint_connections")
|
|
2105
2103
|
|
|
2104
|
+
@property
|
|
2105
|
+
@pulumi.getter(name="provisioningState")
|
|
2106
|
+
def provisioning_state(self) -> str:
|
|
2107
|
+
"""
|
|
2108
|
+
Provisioning state of the vault.
|
|
2109
|
+
"""
|
|
2110
|
+
return pulumi.get(self, "provisioning_state")
|
|
2111
|
+
|
|
2106
2112
|
@property
|
|
2107
2113
|
@pulumi.getter
|
|
2108
2114
|
def sku(self) -> 'outputs.SkuResponse':
|
|
@@ -2119,6 +2125,14 @@ class VaultPropertiesResponse(dict):
|
|
|
2119
2125
|
"""
|
|
2120
2126
|
return pulumi.get(self, "tenant_id")
|
|
2121
2127
|
|
|
2128
|
+
@property
|
|
2129
|
+
@pulumi.getter(name="vaultUri")
|
|
2130
|
+
def vault_uri(self) -> str:
|
|
2131
|
+
"""
|
|
2132
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
2133
|
+
"""
|
|
2134
|
+
return pulumi.get(self, "vault_uri")
|
|
2135
|
+
|
|
2122
2136
|
@property
|
|
2123
2137
|
@pulumi.getter(name="accessPolicies")
|
|
2124
2138
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
@@ -2184,14 +2198,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2184
2198
|
"""
|
|
2185
2199
|
return pulumi.get(self, "network_acls")
|
|
2186
2200
|
|
|
2187
|
-
@property
|
|
2188
|
-
@pulumi.getter(name="provisioningState")
|
|
2189
|
-
def provisioning_state(self) -> Optional[str]:
|
|
2190
|
-
"""
|
|
2191
|
-
Provisioning state of the vault.
|
|
2192
|
-
"""
|
|
2193
|
-
return pulumi.get(self, "provisioning_state")
|
|
2194
|
-
|
|
2195
2201
|
@property
|
|
2196
2202
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2197
2203
|
def public_network_access(self) -> Optional[str]:
|
|
@@ -2208,14 +2214,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2208
2214
|
"""
|
|
2209
2215
|
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
2210
2216
|
|
|
2211
|
-
@property
|
|
2212
|
-
@pulumi.getter(name="vaultUri")
|
|
2213
|
-
def vault_uri(self) -> Optional[str]:
|
|
2214
|
-
"""
|
|
2215
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2216
|
-
"""
|
|
2217
|
-
return pulumi.get(self, "vault_uri")
|
|
2218
|
-
|
|
2219
2217
|
|
|
2220
2218
|
@pulumi.output_type
|
|
2221
2219
|
class VirtualNetworkRuleResponse(dict):
|
|
@@ -23,7 +23,6 @@ __all__ = [
|
|
|
23
23
|
'SkuFamily',
|
|
24
24
|
'SkuName',
|
|
25
25
|
'StoragePermissions',
|
|
26
|
-
'VaultProvisioningState',
|
|
27
26
|
]
|
|
28
27
|
|
|
29
28
|
|
|
@@ -227,11 +226,3 @@ class StoragePermissions(str, Enum):
|
|
|
227
226
|
LISTSAS = "listsas"
|
|
228
227
|
GETSAS = "getsas"
|
|
229
228
|
DELETESAS = "deletesas"
|
|
230
|
-
|
|
231
|
-
|
|
232
|
-
class VaultProvisioningState(str, Enum):
|
|
233
|
-
"""
|
|
234
|
-
Provisioning state of the vault.
|
|
235
|
-
"""
|
|
236
|
-
SUCCEEDED = "Succeeded"
|
|
237
|
-
REGISTERING_DNS = "RegisteringDns"
|
|
@@ -1799,10 +1799,6 @@ if not MYPY:
|
|
|
1799
1799
|
"""
|
|
1800
1800
|
Rules governing the accessibility of the key vault from specific network locations.
|
|
1801
1801
|
"""
|
|
1802
|
-
provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
|
|
1803
|
-
"""
|
|
1804
|
-
Provisioning state of the vault.
|
|
1805
|
-
"""
|
|
1806
1802
|
public_network_access: NotRequired[pulumi.Input[str]]
|
|
1807
1803
|
"""
|
|
1808
1804
|
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
@@ -1811,10 +1807,6 @@ if not MYPY:
|
|
|
1811
1807
|
"""
|
|
1812
1808
|
softDelete data retention days. It accepts >=7 and <=90.
|
|
1813
1809
|
"""
|
|
1814
|
-
vault_uri: NotRequired[pulumi.Input[str]]
|
|
1815
|
-
"""
|
|
1816
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
1817
|
-
"""
|
|
1818
1810
|
elif False:
|
|
1819
1811
|
VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1820
1812
|
|
|
@@ -1832,10 +1824,8 @@ class VaultPropertiesArgs:
|
|
|
1832
1824
|
enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
|
|
1833
1825
|
enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1834
1826
|
network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
|
|
1835
|
-
provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
|
|
1836
1827
|
public_network_access: Optional[pulumi.Input[str]] = None,
|
|
1837
|
-
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None
|
|
1838
|
-
vault_uri: Optional[pulumi.Input[str]] = None):
|
|
1828
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
|
|
1839
1829
|
"""
|
|
1840
1830
|
Properties of the vault
|
|
1841
1831
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
@@ -1850,10 +1840,8 @@ class VaultPropertiesArgs:
|
|
|
1850
1840
|
:param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1851
1841
|
:param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1852
1842
|
:param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1853
|
-
:param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
|
|
1854
1843
|
:param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1855
1844
|
:param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1856
|
-
:param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1857
1845
|
"""
|
|
1858
1846
|
pulumi.set(__self__, "sku", sku)
|
|
1859
1847
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
@@ -1879,8 +1867,6 @@ class VaultPropertiesArgs:
|
|
|
1879
1867
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1880
1868
|
if network_acls is not None:
|
|
1881
1869
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
1882
|
-
if provisioning_state is not None:
|
|
1883
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1884
1870
|
if public_network_access is None:
|
|
1885
1871
|
public_network_access = 'enabled'
|
|
1886
1872
|
if public_network_access is not None:
|
|
@@ -1889,8 +1875,6 @@ class VaultPropertiesArgs:
|
|
|
1889
1875
|
soft_delete_retention_in_days = 90
|
|
1890
1876
|
if soft_delete_retention_in_days is not None:
|
|
1891
1877
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1892
|
-
if vault_uri is not None:
|
|
1893
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1894
1878
|
|
|
1895
1879
|
@property
|
|
1896
1880
|
@pulumi.getter
|
|
@@ -2025,18 +2009,6 @@ class VaultPropertiesArgs:
|
|
|
2025
2009
|
def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
|
|
2026
2010
|
pulumi.set(self, "network_acls", value)
|
|
2027
2011
|
|
|
2028
|
-
@property
|
|
2029
|
-
@pulumi.getter(name="provisioningState")
|
|
2030
|
-
def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
|
|
2031
|
-
"""
|
|
2032
|
-
Provisioning state of the vault.
|
|
2033
|
-
"""
|
|
2034
|
-
return pulumi.get(self, "provisioning_state")
|
|
2035
|
-
|
|
2036
|
-
@provisioning_state.setter
|
|
2037
|
-
def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
|
|
2038
|
-
pulumi.set(self, "provisioning_state", value)
|
|
2039
|
-
|
|
2040
2012
|
@property
|
|
2041
2013
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2042
2014
|
def public_network_access(self) -> Optional[pulumi.Input[str]]:
|
|
@@ -2061,18 +2033,6 @@ class VaultPropertiesArgs:
|
|
|
2061
2033
|
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
2062
2034
|
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
2063
2035
|
|
|
2064
|
-
@property
|
|
2065
|
-
@pulumi.getter(name="vaultUri")
|
|
2066
|
-
def vault_uri(self) -> Optional[pulumi.Input[str]]:
|
|
2067
|
-
"""
|
|
2068
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2069
|
-
"""
|
|
2070
|
-
return pulumi.get(self, "vault_uri")
|
|
2071
|
-
|
|
2072
|
-
@vault_uri.setter
|
|
2073
|
-
def vault_uri(self, value: Optional[pulumi.Input[str]]):
|
|
2074
|
-
pulumi.set(self, "vault_uri", value)
|
|
2075
|
-
|
|
2076
2036
|
|
|
2077
2037
|
if not MYPY:
|
|
2078
2038
|
class VirtualNetworkRuleArgsDict(TypedDict):
|
|
@@ -1837,8 +1837,12 @@ class VaultPropertiesResponse(dict):
|
|
|
1837
1837
|
suggest = "hsm_pool_resource_id"
|
|
1838
1838
|
elif key == "privateEndpointConnections":
|
|
1839
1839
|
suggest = "private_endpoint_connections"
|
|
1840
|
+
elif key == "provisioningState":
|
|
1841
|
+
suggest = "provisioning_state"
|
|
1840
1842
|
elif key == "tenantId":
|
|
1841
1843
|
suggest = "tenant_id"
|
|
1844
|
+
elif key == "vaultUri":
|
|
1845
|
+
suggest = "vault_uri"
|
|
1842
1846
|
elif key == "accessPolicies":
|
|
1843
1847
|
suggest = "access_policies"
|
|
1844
1848
|
elif key == "enablePurgeProtection":
|
|
@@ -1855,14 +1859,10 @@ class VaultPropertiesResponse(dict):
|
|
|
1855
1859
|
suggest = "enabled_for_template_deployment"
|
|
1856
1860
|
elif key == "networkAcls":
|
|
1857
1861
|
suggest = "network_acls"
|
|
1858
|
-
elif key == "provisioningState":
|
|
1859
|
-
suggest = "provisioning_state"
|
|
1860
1862
|
elif key == "publicNetworkAccess":
|
|
1861
1863
|
suggest = "public_network_access"
|
|
1862
1864
|
elif key == "softDeleteRetentionInDays":
|
|
1863
1865
|
suggest = "soft_delete_retention_in_days"
|
|
1864
|
-
elif key == "vaultUri":
|
|
1865
|
-
suggest = "vault_uri"
|
|
1866
1866
|
|
|
1867
1867
|
if suggest:
|
|
1868
1868
|
pulumi.log.warn(f"Key '{key}' not found in VaultPropertiesResponse. Access the value via the '{suggest}' property getter instead.")
|
|
@@ -1878,8 +1878,10 @@ class VaultPropertiesResponse(dict):
|
|
|
1878
1878
|
def __init__(__self__, *,
|
|
1879
1879
|
hsm_pool_resource_id: str,
|
|
1880
1880
|
private_endpoint_connections: Sequence['outputs.PrivateEndpointConnectionItemResponse'],
|
|
1881
|
+
provisioning_state: str,
|
|
1881
1882
|
sku: 'outputs.SkuResponse',
|
|
1882
1883
|
tenant_id: str,
|
|
1884
|
+
vault_uri: str,
|
|
1883
1885
|
access_policies: Optional[Sequence['outputs.AccessPolicyEntryResponse']] = None,
|
|
1884
1886
|
enable_purge_protection: Optional[bool] = None,
|
|
1885
1887
|
enable_rbac_authorization: Optional[bool] = None,
|
|
@@ -1888,16 +1890,16 @@ class VaultPropertiesResponse(dict):
|
|
|
1888
1890
|
enabled_for_disk_encryption: Optional[bool] = None,
|
|
1889
1891
|
enabled_for_template_deployment: Optional[bool] = None,
|
|
1890
1892
|
network_acls: Optional['outputs.NetworkRuleSetResponse'] = None,
|
|
1891
|
-
provisioning_state: Optional[str] = None,
|
|
1892
1893
|
public_network_access: Optional[str] = None,
|
|
1893
|
-
soft_delete_retention_in_days: Optional[int] = None
|
|
1894
|
-
vault_uri: Optional[str] = None):
|
|
1894
|
+
soft_delete_retention_in_days: Optional[int] = None):
|
|
1895
1895
|
"""
|
|
1896
1896
|
Properties of the vault
|
|
1897
1897
|
:param str hsm_pool_resource_id: The resource id of HSM Pool.
|
|
1898
1898
|
:param Sequence['PrivateEndpointConnectionItemResponse'] private_endpoint_connections: List of private endpoint connections associated with the key vault.
|
|
1899
|
+
:param str provisioning_state: Provisioning state of the vault.
|
|
1899
1900
|
:param 'SkuResponse' sku: SKU details
|
|
1900
1901
|
:param str tenant_id: The Azure Active Directory tenant ID that should be used for authenticating requests to the key vault.
|
|
1902
|
+
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1901
1903
|
:param Sequence['AccessPolicyEntryResponse'] access_policies: An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.
|
|
1902
1904
|
These are also available as standalone resources. Do not mix inline and standalone resource as they will conflict with each other, leading to resources deletion.
|
|
1903
1905
|
:param bool enable_purge_protection: Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
|
|
@@ -1907,15 +1909,15 @@ class VaultPropertiesResponse(dict):
|
|
|
1907
1909
|
:param bool enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1908
1910
|
:param bool enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1909
1911
|
:param 'NetworkRuleSetResponse' network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1910
|
-
:param str provisioning_state: Provisioning state of the vault.
|
|
1911
1912
|
:param str public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1912
1913
|
:param int soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1913
|
-
:param str vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1914
1914
|
"""
|
|
1915
1915
|
pulumi.set(__self__, "hsm_pool_resource_id", hsm_pool_resource_id)
|
|
1916
1916
|
pulumi.set(__self__, "private_endpoint_connections", private_endpoint_connections)
|
|
1917
|
+
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1917
1918
|
pulumi.set(__self__, "sku", sku)
|
|
1918
1919
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
1920
|
+
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1919
1921
|
if access_policies is not None:
|
|
1920
1922
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
1921
1923
|
if enable_purge_protection is not None:
|
|
@@ -1936,8 +1938,6 @@ class VaultPropertiesResponse(dict):
|
|
|
1936
1938
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1937
1939
|
if network_acls is not None:
|
|
1938
1940
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
1939
|
-
if provisioning_state is not None:
|
|
1940
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1941
1941
|
if public_network_access is None:
|
|
1942
1942
|
public_network_access = 'enabled'
|
|
1943
1943
|
if public_network_access is not None:
|
|
@@ -1946,8 +1946,6 @@ class VaultPropertiesResponse(dict):
|
|
|
1946
1946
|
soft_delete_retention_in_days = 90
|
|
1947
1947
|
if soft_delete_retention_in_days is not None:
|
|
1948
1948
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1949
|
-
if vault_uri is not None:
|
|
1950
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1951
1949
|
|
|
1952
1950
|
@property
|
|
1953
1951
|
@pulumi.getter(name="hsmPoolResourceId")
|
|
@@ -1965,6 +1963,14 @@ class VaultPropertiesResponse(dict):
|
|
|
1965
1963
|
"""
|
|
1966
1964
|
return pulumi.get(self, "private_endpoint_connections")
|
|
1967
1965
|
|
|
1966
|
+
@property
|
|
1967
|
+
@pulumi.getter(name="provisioningState")
|
|
1968
|
+
def provisioning_state(self) -> str:
|
|
1969
|
+
"""
|
|
1970
|
+
Provisioning state of the vault.
|
|
1971
|
+
"""
|
|
1972
|
+
return pulumi.get(self, "provisioning_state")
|
|
1973
|
+
|
|
1968
1974
|
@property
|
|
1969
1975
|
@pulumi.getter
|
|
1970
1976
|
def sku(self) -> 'outputs.SkuResponse':
|
|
@@ -1981,6 +1987,14 @@ class VaultPropertiesResponse(dict):
|
|
|
1981
1987
|
"""
|
|
1982
1988
|
return pulumi.get(self, "tenant_id")
|
|
1983
1989
|
|
|
1990
|
+
@property
|
|
1991
|
+
@pulumi.getter(name="vaultUri")
|
|
1992
|
+
def vault_uri(self) -> str:
|
|
1993
|
+
"""
|
|
1994
|
+
The URI of the vault for performing operations on keys and secrets.
|
|
1995
|
+
"""
|
|
1996
|
+
return pulumi.get(self, "vault_uri")
|
|
1997
|
+
|
|
1984
1998
|
@property
|
|
1985
1999
|
@pulumi.getter(name="accessPolicies")
|
|
1986
2000
|
def access_policies(self) -> Optional[Sequence['outputs.AccessPolicyEntryResponse']]:
|
|
@@ -2046,14 +2060,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2046
2060
|
"""
|
|
2047
2061
|
return pulumi.get(self, "network_acls")
|
|
2048
2062
|
|
|
2049
|
-
@property
|
|
2050
|
-
@pulumi.getter(name="provisioningState")
|
|
2051
|
-
def provisioning_state(self) -> Optional[str]:
|
|
2052
|
-
"""
|
|
2053
|
-
Provisioning state of the vault.
|
|
2054
|
-
"""
|
|
2055
|
-
return pulumi.get(self, "provisioning_state")
|
|
2056
|
-
|
|
2057
2063
|
@property
|
|
2058
2064
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2059
2065
|
def public_network_access(self) -> Optional[str]:
|
|
@@ -2070,14 +2076,6 @@ class VaultPropertiesResponse(dict):
|
|
|
2070
2076
|
"""
|
|
2071
2077
|
return pulumi.get(self, "soft_delete_retention_in_days")
|
|
2072
2078
|
|
|
2073
|
-
@property
|
|
2074
|
-
@pulumi.getter(name="vaultUri")
|
|
2075
|
-
def vault_uri(self) -> Optional[str]:
|
|
2076
|
-
"""
|
|
2077
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2078
|
-
"""
|
|
2079
|
-
return pulumi.get(self, "vault_uri")
|
|
2080
|
-
|
|
2081
2079
|
|
|
2082
2080
|
@pulumi.output_type
|
|
2083
2081
|
class VirtualNetworkRuleResponse(dict):
|
|
@@ -24,7 +24,6 @@ __all__ = [
|
|
|
24
24
|
'SkuFamily',
|
|
25
25
|
'SkuName',
|
|
26
26
|
'StoragePermissions',
|
|
27
|
-
'VaultProvisioningState',
|
|
28
27
|
]
|
|
29
28
|
|
|
30
29
|
|
|
@@ -232,11 +231,3 @@ class StoragePermissions(str, Enum):
|
|
|
232
231
|
LISTSAS = "listsas"
|
|
233
232
|
GETSAS = "getsas"
|
|
234
233
|
DELETESAS = "deletesas"
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
class VaultProvisioningState(str, Enum):
|
|
238
|
-
"""
|
|
239
|
-
Provisioning state of the vault.
|
|
240
|
-
"""
|
|
241
|
-
SUCCEEDED = "Succeeded"
|
|
242
|
-
REGISTERING_DNS = "RegisteringDns"
|
|
@@ -1856,10 +1856,6 @@ if not MYPY:
|
|
|
1856
1856
|
"""
|
|
1857
1857
|
Rules governing the accessibility of the key vault from specific network locations.
|
|
1858
1858
|
"""
|
|
1859
|
-
provisioning_state: NotRequired[pulumi.Input[Union[str, 'VaultProvisioningState']]]
|
|
1860
|
-
"""
|
|
1861
|
-
Provisioning state of the vault.
|
|
1862
|
-
"""
|
|
1863
1859
|
public_network_access: NotRequired[pulumi.Input[str]]
|
|
1864
1860
|
"""
|
|
1865
1861
|
Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
@@ -1868,10 +1864,6 @@ if not MYPY:
|
|
|
1868
1864
|
"""
|
|
1869
1865
|
softDelete data retention days. It accepts >=7 and <=90.
|
|
1870
1866
|
"""
|
|
1871
|
-
vault_uri: NotRequired[pulumi.Input[str]]
|
|
1872
|
-
"""
|
|
1873
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
1874
|
-
"""
|
|
1875
1867
|
elif False:
|
|
1876
1868
|
VaultPropertiesArgsDict: TypeAlias = Mapping[str, Any]
|
|
1877
1869
|
|
|
@@ -1889,10 +1881,8 @@ class VaultPropertiesArgs:
|
|
|
1889
1881
|
enabled_for_disk_encryption: Optional[pulumi.Input[bool]] = None,
|
|
1890
1882
|
enabled_for_template_deployment: Optional[pulumi.Input[bool]] = None,
|
|
1891
1883
|
network_acls: Optional[pulumi.Input['NetworkRuleSetArgs']] = None,
|
|
1892
|
-
provisioning_state: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]] = None,
|
|
1893
1884
|
public_network_access: Optional[pulumi.Input[str]] = None,
|
|
1894
|
-
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None
|
|
1895
|
-
vault_uri: Optional[pulumi.Input[str]] = None):
|
|
1885
|
+
soft_delete_retention_in_days: Optional[pulumi.Input[int]] = None):
|
|
1896
1886
|
"""
|
|
1897
1887
|
Properties of the vault
|
|
1898
1888
|
:param pulumi.Input['SkuArgs'] sku: SKU details
|
|
@@ -1907,10 +1897,8 @@ class VaultPropertiesArgs:
|
|
|
1907
1897
|
:param pulumi.Input[bool] enabled_for_disk_encryption: Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
1908
1898
|
:param pulumi.Input[bool] enabled_for_template_deployment: Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
1909
1899
|
:param pulumi.Input['NetworkRuleSetArgs'] network_acls: Rules governing the accessibility of the key vault from specific network locations.
|
|
1910
|
-
:param pulumi.Input[Union[str, 'VaultProvisioningState']] provisioning_state: Provisioning state of the vault.
|
|
1911
1900
|
:param pulumi.Input[str] public_network_access: Property to specify whether the vault will accept traffic from public internet. If set to 'disabled' all traffic except private endpoint traffic and that that originates from trusted services will be blocked. This will override the set firewall rules, meaning that even if the firewall rules are present we will not honor the rules.
|
|
1912
1901
|
:param pulumi.Input[int] soft_delete_retention_in_days: softDelete data retention days. It accepts >=7 and <=90.
|
|
1913
|
-
:param pulumi.Input[str] vault_uri: The URI of the vault for performing operations on keys and secrets.
|
|
1914
1902
|
"""
|
|
1915
1903
|
pulumi.set(__self__, "sku", sku)
|
|
1916
1904
|
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
@@ -1936,8 +1924,6 @@ class VaultPropertiesArgs:
|
|
|
1936
1924
|
pulumi.set(__self__, "enabled_for_template_deployment", enabled_for_template_deployment)
|
|
1937
1925
|
if network_acls is not None:
|
|
1938
1926
|
pulumi.set(__self__, "network_acls", network_acls)
|
|
1939
|
-
if provisioning_state is not None:
|
|
1940
|
-
pulumi.set(__self__, "provisioning_state", provisioning_state)
|
|
1941
1927
|
if public_network_access is None:
|
|
1942
1928
|
public_network_access = 'enabled'
|
|
1943
1929
|
if public_network_access is not None:
|
|
@@ -1946,8 +1932,6 @@ class VaultPropertiesArgs:
|
|
|
1946
1932
|
soft_delete_retention_in_days = 90
|
|
1947
1933
|
if soft_delete_retention_in_days is not None:
|
|
1948
1934
|
pulumi.set(__self__, "soft_delete_retention_in_days", soft_delete_retention_in_days)
|
|
1949
|
-
if vault_uri is not None:
|
|
1950
|
-
pulumi.set(__self__, "vault_uri", vault_uri)
|
|
1951
1935
|
|
|
1952
1936
|
@property
|
|
1953
1937
|
@pulumi.getter
|
|
@@ -2082,18 +2066,6 @@ class VaultPropertiesArgs:
|
|
|
2082
2066
|
def network_acls(self, value: Optional[pulumi.Input['NetworkRuleSetArgs']]):
|
|
2083
2067
|
pulumi.set(self, "network_acls", value)
|
|
2084
2068
|
|
|
2085
|
-
@property
|
|
2086
|
-
@pulumi.getter(name="provisioningState")
|
|
2087
|
-
def provisioning_state(self) -> Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]:
|
|
2088
|
-
"""
|
|
2089
|
-
Provisioning state of the vault.
|
|
2090
|
-
"""
|
|
2091
|
-
return pulumi.get(self, "provisioning_state")
|
|
2092
|
-
|
|
2093
|
-
@provisioning_state.setter
|
|
2094
|
-
def provisioning_state(self, value: Optional[pulumi.Input[Union[str, 'VaultProvisioningState']]]):
|
|
2095
|
-
pulumi.set(self, "provisioning_state", value)
|
|
2096
|
-
|
|
2097
2069
|
@property
|
|
2098
2070
|
@pulumi.getter(name="publicNetworkAccess")
|
|
2099
2071
|
def public_network_access(self) -> Optional[pulumi.Input[str]]:
|
|
@@ -2118,18 +2090,6 @@ class VaultPropertiesArgs:
|
|
|
2118
2090
|
def soft_delete_retention_in_days(self, value: Optional[pulumi.Input[int]]):
|
|
2119
2091
|
pulumi.set(self, "soft_delete_retention_in_days", value)
|
|
2120
2092
|
|
|
2121
|
-
@property
|
|
2122
|
-
@pulumi.getter(name="vaultUri")
|
|
2123
|
-
def vault_uri(self) -> Optional[pulumi.Input[str]]:
|
|
2124
|
-
"""
|
|
2125
|
-
The URI of the vault for performing operations on keys and secrets.
|
|
2126
|
-
"""
|
|
2127
|
-
return pulumi.get(self, "vault_uri")
|
|
2128
|
-
|
|
2129
|
-
@vault_uri.setter
|
|
2130
|
-
def vault_uri(self, value: Optional[pulumi.Input[str]]):
|
|
2131
|
-
pulumi.set(self, "vault_uri", value)
|
|
2132
|
-
|
|
2133
2093
|
|
|
2134
2094
|
if not MYPY:
|
|
2135
2095
|
class VirtualNetworkRuleArgsDict(TypedDict):
|