pulumi-azure 6.27.0a1758868424__py3-none-any.whl → 6.27.0a1759511969__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure might be problematic. Click here for more details.
- pulumi_azure/__init__.py +32 -0
- pulumi_azure/apimanagement/backend.py +2 -2
- pulumi_azure/appservice/_inputs.py +78 -6
- pulumi_azure/appservice/app_flex_consumption.py +61 -0
- pulumi_azure/appservice/outputs.py +52 -4
- pulumi_azure/appservice/service_plan.py +14 -14
- pulumi_azure/billing/account_cost_management_export.py +2 -2
- pulumi_azure/cdn/_inputs.py +57 -95
- pulumi_azure/cdn/frontdoor_firewall_policy.py +34 -107
- pulumi_azure/cdn/frontdoor_profile.py +87 -2
- pulumi_azure/cdn/frontdoor_security_policy.py +7 -7
- pulumi_azure/cdn/get_frontdoor_firewall_policy.py +15 -1
- pulumi_azure/cdn/get_frontdoor_profile.py +25 -11
- pulumi_azure/cdn/outputs.py +79 -21
- pulumi_azure/cognitive/account.py +7 -7
- pulumi_azure/compute/__init__.py +1 -0
- pulumi_azure/compute/_inputs.py +79 -47
- pulumi_azure/compute/get_managed_disks.py +140 -0
- pulumi_azure/compute/linux_virtual_machine.py +97 -23
- pulumi_azure/compute/outputs.py +362 -34
- pulumi_azure/compute/windows_virtual_machine.py +172 -42
- pulumi_azure/containerservice/_inputs.py +209 -17
- pulumi_azure/containerservice/cluster_trusted_access_role_binding.py +2 -2
- pulumi_azure/containerservice/get_cluster_node_pool.py +14 -3
- pulumi_azure/containerservice/get_kubernetes_cluster.py +2 -2
- pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py +2 -2
- pulumi_azure/containerservice/kubernetes_cluster.py +49 -2
- pulumi_azure/containerservice/kubernetes_cluster_node_pool.py +49 -2
- pulumi_azure/containerservice/outputs.py +173 -11
- pulumi_azure/core/_inputs.py +0 -54
- pulumi_azure/core/outputs.py +0 -36
- pulumi_azure/core/resource_group_cost_management_export.py +2 -2
- pulumi_azure/core/resource_group_policy_assignment.py +7 -7
- pulumi_azure/core/resource_policy_assignment.py +7 -7
- pulumi_azure/core/subscription_cost_management_export.py +2 -2
- pulumi_azure/core/subscription_policy_assignment.py +7 -7
- pulumi_azure/datafactory/__init__.py +1 -0
- pulumi_azure/datafactory/customer_managed_key.py +439 -0
- pulumi_azure/datafactory/factory.py +2 -2
- pulumi_azure/dataprotection/_inputs.py +36 -6
- pulumi_azure/dataprotection/backup_policy_blob_storage.py +76 -2
- pulumi_azure/dataprotection/outputs.py +24 -4
- pulumi_azure/devcenter/get_project_pool.py +15 -1
- pulumi_azure/devcenter/project_pool.py +47 -0
- pulumi_azure/eventgrid/domain.py +2 -2
- pulumi_azure/eventgrid/domain_topic.py +2 -2
- pulumi_azure/eventgrid/event_subscription.py +2 -2
- pulumi_azure/eventgrid/get_domain.py +2 -2
- pulumi_azure/eventgrid/get_domain_topic.py +2 -2
- pulumi_azure/eventgrid/get_partner_namespace.py +2 -2
- pulumi_azure/eventgrid/get_partner_registration.py +2 -2
- pulumi_azure/eventgrid/get_system_topic.py +28 -6
- pulumi_azure/eventgrid/get_topic.py +2 -2
- pulumi_azure/eventgrid/partner_configuration.py +2 -2
- pulumi_azure/eventgrid/partner_namespace.py +2 -2
- pulumi_azure/eventgrid/partner_registration.py +2 -2
- pulumi_azure/eventgrid/system_topic.py +97 -35
- pulumi_azure/eventgrid/system_topic_event_subscription.py +4 -4
- pulumi_azure/eventgrid/topic.py +2 -2
- pulumi_azure/eventhub/domain.py +2 -2
- pulumi_azure/eventhub/event_grid_topic.py +2 -2
- pulumi_azure/eventhub/event_subscription.py +2 -2
- pulumi_azure/hpc/cache_blob_target.py +2 -2
- pulumi_azure/iot/_inputs.py +27 -1
- pulumi_azure/iot/endpoint_cosmosdb_account.py +64 -3
- pulumi_azure/iot/endpoint_eventhub.py +64 -3
- pulumi_azure/iot/endpoint_servicebus_queue.py +64 -3
- pulumi_azure/iot/endpoint_servicebus_topic.py +64 -3
- pulumi_azure/iot/endpoint_storage_container.py +64 -3
- pulumi_azure/iot/outputs.py +19 -1
- pulumi_azure/keyvault/_inputs.py +3 -17
- pulumi_azure/keyvault/get_key_vault.py +13 -1
- pulumi_azure/keyvault/key_vault.py +78 -35
- pulumi_azure/keyvault/outputs.py +2 -10
- pulumi_azure/kusto/_inputs.py +16 -6
- pulumi_azure/kusto/cluster.py +95 -66
- pulumi_azure/kusto/outputs.py +10 -4
- pulumi_azure/lb/get_lb_outbound_rule.py +12 -1
- pulumi_azure/lb/get_lb_rule.py +28 -4
- pulumi_azure/lb/load_balancer.py +94 -0
- pulumi_azure/lb/nat_rule.py +115 -29
- pulumi_azure/lb/outbound_rule.py +60 -17
- pulumi_azure/lb/rule.py +116 -30
- pulumi_azure/loadtest/_inputs.py +6 -3
- pulumi_azure/loadtest/load_test.py +0 -4
- pulumi_azure/loadtest/outputs.py +4 -2
- pulumi_azure/logicapps/_inputs.py +46 -987
- pulumi_azure/logicapps/get_standard.py +0 -7
- pulumi_azure/logicapps/outputs.py +117 -101
- pulumi_azure/logicapps/standard.py +7 -7
- pulumi_azure/machinelearning/_inputs.py +24 -4
- pulumi_azure/machinelearning/compute_instance.py +35 -7
- pulumi_azure/machinelearning/datastore_blobstorage.py +2 -2
- pulumi_azure/machinelearning/datastore_datalake_gen2.py +2 -2
- pulumi_azure/machinelearning/inference_cluster.py +2 -2
- pulumi_azure/machinelearning/outputs.py +17 -3
- pulumi_azure/machinelearning/workspace.py +61 -0
- pulumi_azure/management/_inputs.py +0 -18
- pulumi_azure/management/group_policy_assignment.py +7 -7
- pulumi_azure/management/outputs.py +0 -12
- pulumi_azure/management/private_link_association.py +0 -70
- pulumi_azure/mobile/_inputs.py +14 -6
- pulumi_azure/mobile/network_sim.py +2 -6
- pulumi_azure/mobile/network_sim_policy.py +2 -6
- pulumi_azure/mobile/network_slice.py +116 -31
- pulumi_azure/mobile/outputs.py +6 -4
- pulumi_azure/monitoring/_inputs.py +15 -9
- pulumi_azure/monitoring/activity_log_alert.py +7 -7
- pulumi_azure/monitoring/outputs.py +10 -6
- pulumi_azure/mssql/job_step.py +11 -11
- pulumi_azure/mysql/_inputs.py +20 -0
- pulumi_azure/mysql/outputs.py +14 -0
- pulumi_azure/netapp/_inputs.py +18 -6
- pulumi_azure/netapp/account.py +2 -2
- pulumi_azure/netapp/account_encryption.py +132 -4
- pulumi_azure/netapp/backup_policy.py +2 -2
- pulumi_azure/netapp/backup_vault.py +2 -2
- pulumi_azure/netapp/get_account.py +2 -2
- pulumi_azure/netapp/get_account_encryption.py +25 -3
- pulumi_azure/netapp/get_backup_policy.py +2 -2
- pulumi_azure/netapp/get_backup_vault.py +2 -2
- pulumi_azure/netapp/get_pool.py +17 -3
- pulumi_azure/netapp/get_snapshot.py +2 -2
- pulumi_azure/netapp/get_snapshot_policy.py +2 -2
- pulumi_azure/netapp/get_volume.py +17 -3
- pulumi_azure/netapp/get_volume_group_oracle.py +2 -2
- pulumi_azure/netapp/get_volume_group_sap_hana.py +2 -2
- pulumi_azure/netapp/get_volume_quota_rule.py +2 -2
- pulumi_azure/netapp/outputs.py +12 -4
- pulumi_azure/netapp/pool.py +104 -9
- pulumi_azure/netapp/snapshot.py +2 -2
- pulumi_azure/netapp/snapshot_policy.py +2 -2
- pulumi_azure/netapp/volume.py +82 -7
- pulumi_azure/netapp/volume_group_oracle.py +2 -2
- pulumi_azure/netapp/volume_group_sap_hana.py +2 -2
- pulumi_azure/netapp/volume_quota_rule.py +2 -2
- pulumi_azure/network/__init__.py +2 -0
- pulumi_azure/network/network_manager_ipam_pool_static_cidr.py +415 -0
- pulumi_azure/network/network_manager_routing_configuration.py +7 -7
- pulumi_azure/network/network_manager_routing_rule_collection.py +429 -0
- pulumi_azure/network/subnet.py +76 -1
- pulumi_azure/oracle/__init__.py +3 -0
- pulumi_azure/oracle/autonomous_database_backup.py +310 -0
- pulumi_azure/oracle/get_autonomous_database_backup.py +347 -0
- pulumi_azure/oracle/get_autonomous_database_backups.py +138 -0
- pulumi_azure/oracle/outputs.py +191 -0
- pulumi_azure/paloalto/next_generation_firewall_virtual_hub_local_rulestack.py +2 -2
- pulumi_azure/paloalto/next_generation_firewall_virtual_hub_panorama.py +2 -2
- pulumi_azure/paloalto/next_generation_firewall_virtual_network_local_rulestack.py +2 -2
- pulumi_azure/paloalto/next_generation_firewall_virtual_network_panorama.py +2 -2
- pulumi_azure/policy/_inputs.py +6 -0
- pulumi_azure/policy/outputs.py +4 -0
- pulumi_azure/postgresql/flexible_server.py +7 -7
- pulumi_azure/postgresql/flexible_server_firewall_rule.py +14 -14
- pulumi_azure/pulumi-plugin.json +1 -1
- pulumi_azure/search/service.py +7 -7
- pulumi_azure/sentinel/_inputs.py +144 -0
- pulumi_azure/sentinel/authomation_rule.py +47 -0
- pulumi_azure/sentinel/automation_rule.py +47 -0
- pulumi_azure/sentinel/outputs.py +84 -0
- pulumi_azure/storage/_inputs.py +3 -3
- pulumi_azure/storage/container_immutability_policy.py +2 -2
- pulumi_azure/storage/get_queue.py +59 -8
- pulumi_azure/storage/outputs.py +2 -2
- pulumi_azure/storage/queue.py +159 -27
- {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/METADATA +1 -1
- {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/RECORD +169 -162
- {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/WHEEL +0 -0
- {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/top_level.txt +0 -0
|
@@ -35,6 +35,7 @@ class KeyVaultArgs:
|
|
|
35
35
|
network_acls: Optional[pulumi.Input['KeyVaultNetworkAclsArgs']] = None,
|
|
36
36
|
public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
37
37
|
purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
38
|
+
rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
38
39
|
soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
|
|
39
40
|
tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
|
40
41
|
"""
|
|
@@ -45,9 +46,6 @@ class KeyVaultArgs:
|
|
|
45
46
|
:param pulumi.Input[Sequence[pulumi.Input['KeyVaultAccessPolicyArgs']]] access_policies: A list of up to 1024 objects describing access policies, as described below.
|
|
46
47
|
|
|
47
48
|
> **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
|
|
48
|
-
:param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
49
|
-
|
|
50
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
51
49
|
:param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
52
50
|
:param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
53
51
|
:param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
@@ -58,6 +56,9 @@ class KeyVaultArgs:
|
|
|
58
56
|
:param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
|
|
59
57
|
|
|
60
58
|
!> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
|
|
59
|
+
:param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
60
|
+
|
|
61
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
61
62
|
:param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
|
|
62
63
|
|
|
63
64
|
> **Note:** This field can only be configured one time and cannot be updated.
|
|
@@ -69,10 +70,13 @@ class KeyVaultArgs:
|
|
|
69
70
|
if access_policies is not None:
|
|
70
71
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
71
72
|
if contacts is not None:
|
|
72
|
-
warnings.warn("""As the `contact` property
|
|
73
|
-
pulumi.log.warn("""contacts is deprecated: As the `contact` property
|
|
73
|
+
warnings.warn("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""", DeprecationWarning)
|
|
74
|
+
pulumi.log.warn("""contacts is deprecated: As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
|
|
74
75
|
if contacts is not None:
|
|
75
76
|
pulumi.set(__self__, "contacts", contacts)
|
|
77
|
+
if enable_rbac_authorization is not None:
|
|
78
|
+
warnings.warn("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""", DeprecationWarning)
|
|
79
|
+
pulumi.log.warn("""enable_rbac_authorization is deprecated: This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
|
|
76
80
|
if enable_rbac_authorization is not None:
|
|
77
81
|
pulumi.set(__self__, "enable_rbac_authorization", enable_rbac_authorization)
|
|
78
82
|
if enabled_for_deployment is not None:
|
|
@@ -91,6 +95,8 @@ class KeyVaultArgs:
|
|
|
91
95
|
pulumi.set(__self__, "public_network_access_enabled", public_network_access_enabled)
|
|
92
96
|
if purge_protection_enabled is not None:
|
|
93
97
|
pulumi.set(__self__, "purge_protection_enabled", purge_protection_enabled)
|
|
98
|
+
if rbac_authorization_enabled is not None:
|
|
99
|
+
pulumi.set(__self__, "rbac_authorization_enabled", rbac_authorization_enabled)
|
|
94
100
|
if soft_delete_retention_days is not None:
|
|
95
101
|
pulumi.set(__self__, "soft_delete_retention_days", soft_delete_retention_days)
|
|
96
102
|
if tags is not None:
|
|
@@ -148,7 +154,7 @@ class KeyVaultArgs:
|
|
|
148
154
|
|
|
149
155
|
@_builtins.property
|
|
150
156
|
@pulumi.getter
|
|
151
|
-
@_utilities.deprecated("""As the `contact` property
|
|
157
|
+
@_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
|
|
152
158
|
def contacts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['KeyVaultContactArgs']]]]:
|
|
153
159
|
return pulumi.get(self, "contacts")
|
|
154
160
|
|
|
@@ -158,12 +164,8 @@ class KeyVaultArgs:
|
|
|
158
164
|
|
|
159
165
|
@_builtins.property
|
|
160
166
|
@pulumi.getter(name="enableRbacAuthorization")
|
|
167
|
+
@_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
|
|
161
168
|
def enable_rbac_authorization(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
162
|
-
"""
|
|
163
|
-
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
164
|
-
|
|
165
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
166
|
-
"""
|
|
167
169
|
return pulumi.get(self, "enable_rbac_authorization")
|
|
168
170
|
|
|
169
171
|
@enable_rbac_authorization.setter
|
|
@@ -268,6 +270,20 @@ class KeyVaultArgs:
|
|
|
268
270
|
def purge_protection_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
269
271
|
pulumi.set(self, "purge_protection_enabled", value)
|
|
270
272
|
|
|
273
|
+
@_builtins.property
|
|
274
|
+
@pulumi.getter(name="rbacAuthorizationEnabled")
|
|
275
|
+
def rbac_authorization_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
276
|
+
"""
|
|
277
|
+
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
278
|
+
|
|
279
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
280
|
+
"""
|
|
281
|
+
return pulumi.get(self, "rbac_authorization_enabled")
|
|
282
|
+
|
|
283
|
+
@rbac_authorization_enabled.setter
|
|
284
|
+
def rbac_authorization_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
285
|
+
pulumi.set(self, "rbac_authorization_enabled", value)
|
|
286
|
+
|
|
271
287
|
@_builtins.property
|
|
272
288
|
@pulumi.getter(name="softDeleteRetentionDays")
|
|
273
289
|
def soft_delete_retention_days(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
@@ -309,6 +325,7 @@ class _KeyVaultState:
|
|
|
309
325
|
network_acls: Optional[pulumi.Input['KeyVaultNetworkAclsArgs']] = None,
|
|
310
326
|
public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
311
327
|
purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
328
|
+
rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
312
329
|
resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
313
330
|
sku_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
314
331
|
soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
|
|
@@ -320,9 +337,6 @@ class _KeyVaultState:
|
|
|
320
337
|
:param pulumi.Input[Sequence[pulumi.Input['KeyVaultAccessPolicyArgs']]] access_policies: A list of up to 1024 objects describing access policies, as described below.
|
|
321
338
|
|
|
322
339
|
> **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
|
|
323
|
-
:param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
324
|
-
|
|
325
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
326
340
|
:param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
327
341
|
:param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
328
342
|
:param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
@@ -333,6 +347,9 @@ class _KeyVaultState:
|
|
|
333
347
|
:param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
|
|
334
348
|
|
|
335
349
|
!> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
|
|
350
|
+
:param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
351
|
+
|
|
352
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
336
353
|
:param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
|
|
337
354
|
:param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
|
|
338
355
|
:param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
|
|
@@ -345,10 +362,13 @@ class _KeyVaultState:
|
|
|
345
362
|
if access_policies is not None:
|
|
346
363
|
pulumi.set(__self__, "access_policies", access_policies)
|
|
347
364
|
if contacts is not None:
|
|
348
|
-
warnings.warn("""As the `contact` property
|
|
349
|
-
pulumi.log.warn("""contacts is deprecated: As the `contact` property
|
|
365
|
+
warnings.warn("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""", DeprecationWarning)
|
|
366
|
+
pulumi.log.warn("""contacts is deprecated: As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
|
|
350
367
|
if contacts is not None:
|
|
351
368
|
pulumi.set(__self__, "contacts", contacts)
|
|
369
|
+
if enable_rbac_authorization is not None:
|
|
370
|
+
warnings.warn("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""", DeprecationWarning)
|
|
371
|
+
pulumi.log.warn("""enable_rbac_authorization is deprecated: This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
|
|
352
372
|
if enable_rbac_authorization is not None:
|
|
353
373
|
pulumi.set(__self__, "enable_rbac_authorization", enable_rbac_authorization)
|
|
354
374
|
if enabled_for_deployment is not None:
|
|
@@ -367,6 +387,8 @@ class _KeyVaultState:
|
|
|
367
387
|
pulumi.set(__self__, "public_network_access_enabled", public_network_access_enabled)
|
|
368
388
|
if purge_protection_enabled is not None:
|
|
369
389
|
pulumi.set(__self__, "purge_protection_enabled", purge_protection_enabled)
|
|
390
|
+
if rbac_authorization_enabled is not None:
|
|
391
|
+
pulumi.set(__self__, "rbac_authorization_enabled", rbac_authorization_enabled)
|
|
370
392
|
if resource_group_name is not None:
|
|
371
393
|
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
|
372
394
|
if sku_name is not None:
|
|
@@ -396,7 +418,7 @@ class _KeyVaultState:
|
|
|
396
418
|
|
|
397
419
|
@_builtins.property
|
|
398
420
|
@pulumi.getter
|
|
399
|
-
@_utilities.deprecated("""As the `contact` property
|
|
421
|
+
@_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
|
|
400
422
|
def contacts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['KeyVaultContactArgs']]]]:
|
|
401
423
|
return pulumi.get(self, "contacts")
|
|
402
424
|
|
|
@@ -406,12 +428,8 @@ class _KeyVaultState:
|
|
|
406
428
|
|
|
407
429
|
@_builtins.property
|
|
408
430
|
@pulumi.getter(name="enableRbacAuthorization")
|
|
431
|
+
@_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
|
|
409
432
|
def enable_rbac_authorization(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
410
|
-
"""
|
|
411
|
-
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
412
|
-
|
|
413
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
414
|
-
"""
|
|
415
433
|
return pulumi.get(self, "enable_rbac_authorization")
|
|
416
434
|
|
|
417
435
|
@enable_rbac_authorization.setter
|
|
@@ -516,6 +534,20 @@ class _KeyVaultState:
|
|
|
516
534
|
def purge_protection_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
517
535
|
pulumi.set(self, "purge_protection_enabled", value)
|
|
518
536
|
|
|
537
|
+
@_builtins.property
|
|
538
|
+
@pulumi.getter(name="rbacAuthorizationEnabled")
|
|
539
|
+
def rbac_authorization_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
540
|
+
"""
|
|
541
|
+
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
542
|
+
|
|
543
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
544
|
+
"""
|
|
545
|
+
return pulumi.get(self, "rbac_authorization_enabled")
|
|
546
|
+
|
|
547
|
+
@rbac_authorization_enabled.setter
|
|
548
|
+
def rbac_authorization_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
549
|
+
pulumi.set(self, "rbac_authorization_enabled", value)
|
|
550
|
+
|
|
519
551
|
@_builtins.property
|
|
520
552
|
@pulumi.getter(name="resourceGroupName")
|
|
521
553
|
def resource_group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
@@ -608,6 +640,7 @@ class KeyVault(pulumi.CustomResource):
|
|
|
608
640
|
network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
|
|
609
641
|
public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
610
642
|
purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
643
|
+
rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
611
644
|
resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
612
645
|
sku_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
613
646
|
soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
|
|
@@ -664,9 +697,6 @@ class KeyVault(pulumi.CustomResource):
|
|
|
664
697
|
:param pulumi.Input[Sequence[pulumi.Input[Union['KeyVaultAccessPolicyArgs', 'KeyVaultAccessPolicyArgsDict']]]] access_policies: A list of up to 1024 objects describing access policies, as described below.
|
|
665
698
|
|
|
666
699
|
> **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
|
|
667
|
-
:param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
668
|
-
|
|
669
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
670
700
|
:param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
671
701
|
:param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
672
702
|
:param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
@@ -677,6 +707,9 @@ class KeyVault(pulumi.CustomResource):
|
|
|
677
707
|
:param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
|
|
678
708
|
|
|
679
709
|
!> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
|
|
710
|
+
:param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
711
|
+
|
|
712
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
680
713
|
:param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
|
|
681
714
|
:param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
|
|
682
715
|
:param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
|
|
@@ -762,6 +795,7 @@ class KeyVault(pulumi.CustomResource):
|
|
|
762
795
|
network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
|
|
763
796
|
public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
764
797
|
purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
798
|
+
rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
765
799
|
resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
766
800
|
sku_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
767
801
|
soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
|
|
@@ -787,6 +821,7 @@ class KeyVault(pulumi.CustomResource):
|
|
|
787
821
|
__props__.__dict__["network_acls"] = network_acls
|
|
788
822
|
__props__.__dict__["public_network_access_enabled"] = public_network_access_enabled
|
|
789
823
|
__props__.__dict__["purge_protection_enabled"] = purge_protection_enabled
|
|
824
|
+
__props__.__dict__["rbac_authorization_enabled"] = rbac_authorization_enabled
|
|
790
825
|
if resource_group_name is None and not opts.urn:
|
|
791
826
|
raise TypeError("Missing required property 'resource_group_name'")
|
|
792
827
|
__props__.__dict__["resource_group_name"] = resource_group_name
|
|
@@ -820,6 +855,7 @@ class KeyVault(pulumi.CustomResource):
|
|
|
820
855
|
network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
|
|
821
856
|
public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
822
857
|
purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
858
|
+
rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
823
859
|
resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
824
860
|
sku_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
825
861
|
soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
|
|
@@ -836,9 +872,6 @@ class KeyVault(pulumi.CustomResource):
|
|
|
836
872
|
:param pulumi.Input[Sequence[pulumi.Input[Union['KeyVaultAccessPolicyArgs', 'KeyVaultAccessPolicyArgsDict']]]] access_policies: A list of up to 1024 objects describing access policies, as described below.
|
|
837
873
|
|
|
838
874
|
> **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
|
|
839
|
-
:param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
840
|
-
|
|
841
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
842
875
|
:param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
|
|
843
876
|
:param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
|
|
844
877
|
:param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
|
|
@@ -849,6 +882,9 @@ class KeyVault(pulumi.CustomResource):
|
|
|
849
882
|
:param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
|
|
850
883
|
|
|
851
884
|
!> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
|
|
885
|
+
:param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
886
|
+
|
|
887
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
852
888
|
:param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
|
|
853
889
|
:param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
|
|
854
890
|
:param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
|
|
@@ -873,6 +909,7 @@ class KeyVault(pulumi.CustomResource):
|
|
|
873
909
|
__props__.__dict__["network_acls"] = network_acls
|
|
874
910
|
__props__.__dict__["public_network_access_enabled"] = public_network_access_enabled
|
|
875
911
|
__props__.__dict__["purge_protection_enabled"] = purge_protection_enabled
|
|
912
|
+
__props__.__dict__["rbac_authorization_enabled"] = rbac_authorization_enabled
|
|
876
913
|
__props__.__dict__["resource_group_name"] = resource_group_name
|
|
877
914
|
__props__.__dict__["sku_name"] = sku_name
|
|
878
915
|
__props__.__dict__["soft_delete_retention_days"] = soft_delete_retention_days
|
|
@@ -893,18 +930,14 @@ class KeyVault(pulumi.CustomResource):
|
|
|
893
930
|
|
|
894
931
|
@_builtins.property
|
|
895
932
|
@pulumi.getter
|
|
896
|
-
@_utilities.deprecated("""As the `contact` property
|
|
933
|
+
@_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
|
|
897
934
|
def contacts(self) -> pulumi.Output[Sequence['outputs.KeyVaultContact']]:
|
|
898
935
|
return pulumi.get(self, "contacts")
|
|
899
936
|
|
|
900
937
|
@_builtins.property
|
|
901
938
|
@pulumi.getter(name="enableRbacAuthorization")
|
|
902
|
-
|
|
903
|
-
|
|
904
|
-
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
905
|
-
|
|
906
|
-
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
907
|
-
"""
|
|
939
|
+
@_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
|
|
940
|
+
def enable_rbac_authorization(self) -> pulumi.Output[_builtins.bool]:
|
|
908
941
|
return pulumi.get(self, "enable_rbac_authorization")
|
|
909
942
|
|
|
910
943
|
@_builtins.property
|
|
@@ -973,6 +1006,16 @@ class KeyVault(pulumi.CustomResource):
|
|
|
973
1006
|
"""
|
|
974
1007
|
return pulumi.get(self, "purge_protection_enabled")
|
|
975
1008
|
|
|
1009
|
+
@_builtins.property
|
|
1010
|
+
@pulumi.getter(name="rbacAuthorizationEnabled")
|
|
1011
|
+
def rbac_authorization_enabled(self) -> pulumi.Output[_builtins.bool]:
|
|
1012
|
+
"""
|
|
1013
|
+
Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
|
|
1014
|
+
|
|
1015
|
+
> **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
|
|
1016
|
+
"""
|
|
1017
|
+
return pulumi.get(self, "rbac_authorization_enabled")
|
|
1018
|
+
|
|
976
1019
|
@_builtins.property
|
|
977
1020
|
@pulumi.getter(name="resourceGroupName")
|
|
978
1021
|
def resource_group_name(self) -> pulumi.Output[_builtins.str]:
|
pulumi_azure/keyvault/outputs.py
CHANGED
|
@@ -1734,9 +1734,7 @@ class KeyVaultContact(dict):
|
|
|
1734
1734
|
name: Optional[_builtins.str] = None,
|
|
1735
1735
|
phone: Optional[_builtins.str] = None):
|
|
1736
1736
|
"""
|
|
1737
|
-
:param _builtins.str
|
|
1738
|
-
:param _builtins.str name: Name of the contact.
|
|
1739
|
-
:param _builtins.str phone: Phone number of the contact.
|
|
1737
|
+
:param _builtins.str name: Specifies the name of the Key Vault. Changing this forces a new resource to be created. The name must be globally unique. If the vault is in a recoverable state then the vault will need to be purged before reusing the name.
|
|
1740
1738
|
"""
|
|
1741
1739
|
pulumi.set(__self__, "email", email)
|
|
1742
1740
|
if name is not None:
|
|
@@ -1747,25 +1745,19 @@ class KeyVaultContact(dict):
|
|
|
1747
1745
|
@_builtins.property
|
|
1748
1746
|
@pulumi.getter
|
|
1749
1747
|
def email(self) -> _builtins.str:
|
|
1750
|
-
"""
|
|
1751
|
-
E-mail address of the contact.
|
|
1752
|
-
"""
|
|
1753
1748
|
return pulumi.get(self, "email")
|
|
1754
1749
|
|
|
1755
1750
|
@_builtins.property
|
|
1756
1751
|
@pulumi.getter
|
|
1757
1752
|
def name(self) -> Optional[_builtins.str]:
|
|
1758
1753
|
"""
|
|
1759
|
-
|
|
1754
|
+
Specifies the name of the Key Vault. Changing this forces a new resource to be created. The name must be globally unique. If the vault is in a recoverable state then the vault will need to be purged before reusing the name.
|
|
1760
1755
|
"""
|
|
1761
1756
|
return pulumi.get(self, "name")
|
|
1762
1757
|
|
|
1763
1758
|
@_builtins.property
|
|
1764
1759
|
@pulumi.getter
|
|
1765
1760
|
def phone(self) -> Optional[_builtins.str]:
|
|
1766
|
-
"""
|
|
1767
|
-
Phone number of the contact.
|
|
1768
|
-
"""
|
|
1769
1761
|
return pulumi.get(self, "phone")
|
|
1770
1762
|
|
|
1771
1763
|
|
pulumi_azure/kusto/_inputs.py
CHANGED
|
@@ -263,6 +263,9 @@ class ClusterIdentityArgs:
|
|
|
263
263
|
if not MYPY:
|
|
264
264
|
class ClusterLanguageExtensionArgsDict(TypedDict):
|
|
265
265
|
image: pulumi.Input[_builtins.str]
|
|
266
|
+
"""
|
|
267
|
+
The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
|
|
268
|
+
"""
|
|
266
269
|
name: pulumi.Input[_builtins.str]
|
|
267
270
|
"""
|
|
268
271
|
The name of the Kusto Cluster to create. Only lowercase Alphanumeric characters allowed, starting with a letter. Changing this forces a new resource to be created.
|
|
@@ -276,6 +279,7 @@ class ClusterLanguageExtensionArgs:
|
|
|
276
279
|
image: pulumi.Input[_builtins.str],
|
|
277
280
|
name: pulumi.Input[_builtins.str]):
|
|
278
281
|
"""
|
|
282
|
+
:param pulumi.Input[_builtins.str] image: The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
|
|
279
283
|
:param pulumi.Input[_builtins.str] name: The name of the Kusto Cluster to create. Only lowercase Alphanumeric characters allowed, starting with a letter. Changing this forces a new resource to be created.
|
|
280
284
|
"""
|
|
281
285
|
pulumi.set(__self__, "image", image)
|
|
@@ -284,6 +288,9 @@ class ClusterLanguageExtensionArgs:
|
|
|
284
288
|
@_builtins.property
|
|
285
289
|
@pulumi.getter
|
|
286
290
|
def image(self) -> pulumi.Input[_builtins.str]:
|
|
291
|
+
"""
|
|
292
|
+
The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
|
|
293
|
+
"""
|
|
287
294
|
return pulumi.get(self, "image")
|
|
288
295
|
|
|
289
296
|
@image.setter
|
|
@@ -307,11 +314,11 @@ if not MYPY:
|
|
|
307
314
|
class ClusterOptimizedAutoScaleArgsDict(TypedDict):
|
|
308
315
|
maximum_instances: pulumi.Input[_builtins.int]
|
|
309
316
|
"""
|
|
310
|
-
The maximum number of allowed instances.
|
|
317
|
+
The maximum number of allowed instances. Possible values range between `0` and `1000`.
|
|
311
318
|
"""
|
|
312
319
|
minimum_instances: pulumi.Input[_builtins.int]
|
|
313
320
|
"""
|
|
314
|
-
The minimum number of allowed instances.
|
|
321
|
+
The minimum number of allowed instances. Possible values range between `0` and `1000`.
|
|
315
322
|
"""
|
|
316
323
|
elif False:
|
|
317
324
|
ClusterOptimizedAutoScaleArgsDict: TypeAlias = Mapping[str, Any]
|
|
@@ -322,8 +329,8 @@ class ClusterOptimizedAutoScaleArgs:
|
|
|
322
329
|
maximum_instances: pulumi.Input[_builtins.int],
|
|
323
330
|
minimum_instances: pulumi.Input[_builtins.int]):
|
|
324
331
|
"""
|
|
325
|
-
:param pulumi.Input[_builtins.int] maximum_instances: The maximum number of allowed instances.
|
|
326
|
-
:param pulumi.Input[_builtins.int] minimum_instances: The minimum number of allowed instances.
|
|
332
|
+
:param pulumi.Input[_builtins.int] maximum_instances: The maximum number of allowed instances. Possible values range between `0` and `1000`.
|
|
333
|
+
:param pulumi.Input[_builtins.int] minimum_instances: The minimum number of allowed instances. Possible values range between `0` and `1000`.
|
|
327
334
|
"""
|
|
328
335
|
pulumi.set(__self__, "maximum_instances", maximum_instances)
|
|
329
336
|
pulumi.set(__self__, "minimum_instances", minimum_instances)
|
|
@@ -332,7 +339,7 @@ class ClusterOptimizedAutoScaleArgs:
|
|
|
332
339
|
@pulumi.getter(name="maximumInstances")
|
|
333
340
|
def maximum_instances(self) -> pulumi.Input[_builtins.int]:
|
|
334
341
|
"""
|
|
335
|
-
The maximum number of allowed instances.
|
|
342
|
+
The maximum number of allowed instances. Possible values range between `0` and `1000`.
|
|
336
343
|
"""
|
|
337
344
|
return pulumi.get(self, "maximum_instances")
|
|
338
345
|
|
|
@@ -344,7 +351,7 @@ class ClusterOptimizedAutoScaleArgs:
|
|
|
344
351
|
@pulumi.getter(name="minimumInstances")
|
|
345
352
|
def minimum_instances(self) -> pulumi.Input[_builtins.int]:
|
|
346
353
|
"""
|
|
347
|
-
The minimum number of allowed instances.
|
|
354
|
+
The minimum number of allowed instances. Possible values range between `0` and `1000`.
|
|
348
355
|
"""
|
|
349
356
|
return pulumi.get(self, "minimum_instances")
|
|
350
357
|
|
|
@@ -364,6 +371,7 @@ if not MYPY:
|
|
|
364
371
|
Specifies the node count for the cluster. Boundaries depend on the SKU name.
|
|
365
372
|
|
|
366
373
|
> **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
|
|
374
|
+
|
|
367
375
|
> **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
|
|
368
376
|
"""
|
|
369
377
|
elif False:
|
|
@@ -379,6 +387,7 @@ class ClusterSkuArgs:
|
|
|
379
387
|
:param pulumi.Input[_builtins.int] capacity: Specifies the node count for the cluster. Boundaries depend on the SKU name.
|
|
380
388
|
|
|
381
389
|
> **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
|
|
390
|
+
|
|
382
391
|
> **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
|
|
383
392
|
"""
|
|
384
393
|
pulumi.set(__self__, "name", name)
|
|
@@ -404,6 +413,7 @@ class ClusterSkuArgs:
|
|
|
404
413
|
Specifies the node count for the cluster. Boundaries depend on the SKU name.
|
|
405
414
|
|
|
406
415
|
> **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
|
|
416
|
+
|
|
407
417
|
> **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
|
|
408
418
|
"""
|
|
409
419
|
return pulumi.get(self, "capacity")
|