pulumi-azure 6.27.0a1758868424__py3-none-any.whl → 6.27.0a1759511969__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure might be problematic. Click here for more details.

Files changed (169) hide show
  1. pulumi_azure/__init__.py +32 -0
  2. pulumi_azure/apimanagement/backend.py +2 -2
  3. pulumi_azure/appservice/_inputs.py +78 -6
  4. pulumi_azure/appservice/app_flex_consumption.py +61 -0
  5. pulumi_azure/appservice/outputs.py +52 -4
  6. pulumi_azure/appservice/service_plan.py +14 -14
  7. pulumi_azure/billing/account_cost_management_export.py +2 -2
  8. pulumi_azure/cdn/_inputs.py +57 -95
  9. pulumi_azure/cdn/frontdoor_firewall_policy.py +34 -107
  10. pulumi_azure/cdn/frontdoor_profile.py +87 -2
  11. pulumi_azure/cdn/frontdoor_security_policy.py +7 -7
  12. pulumi_azure/cdn/get_frontdoor_firewall_policy.py +15 -1
  13. pulumi_azure/cdn/get_frontdoor_profile.py +25 -11
  14. pulumi_azure/cdn/outputs.py +79 -21
  15. pulumi_azure/cognitive/account.py +7 -7
  16. pulumi_azure/compute/__init__.py +1 -0
  17. pulumi_azure/compute/_inputs.py +79 -47
  18. pulumi_azure/compute/get_managed_disks.py +140 -0
  19. pulumi_azure/compute/linux_virtual_machine.py +97 -23
  20. pulumi_azure/compute/outputs.py +362 -34
  21. pulumi_azure/compute/windows_virtual_machine.py +172 -42
  22. pulumi_azure/containerservice/_inputs.py +209 -17
  23. pulumi_azure/containerservice/cluster_trusted_access_role_binding.py +2 -2
  24. pulumi_azure/containerservice/get_cluster_node_pool.py +14 -3
  25. pulumi_azure/containerservice/get_kubernetes_cluster.py +2 -2
  26. pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py +2 -2
  27. pulumi_azure/containerservice/kubernetes_cluster.py +49 -2
  28. pulumi_azure/containerservice/kubernetes_cluster_node_pool.py +49 -2
  29. pulumi_azure/containerservice/outputs.py +173 -11
  30. pulumi_azure/core/_inputs.py +0 -54
  31. pulumi_azure/core/outputs.py +0 -36
  32. pulumi_azure/core/resource_group_cost_management_export.py +2 -2
  33. pulumi_azure/core/resource_group_policy_assignment.py +7 -7
  34. pulumi_azure/core/resource_policy_assignment.py +7 -7
  35. pulumi_azure/core/subscription_cost_management_export.py +2 -2
  36. pulumi_azure/core/subscription_policy_assignment.py +7 -7
  37. pulumi_azure/datafactory/__init__.py +1 -0
  38. pulumi_azure/datafactory/customer_managed_key.py +439 -0
  39. pulumi_azure/datafactory/factory.py +2 -2
  40. pulumi_azure/dataprotection/_inputs.py +36 -6
  41. pulumi_azure/dataprotection/backup_policy_blob_storage.py +76 -2
  42. pulumi_azure/dataprotection/outputs.py +24 -4
  43. pulumi_azure/devcenter/get_project_pool.py +15 -1
  44. pulumi_azure/devcenter/project_pool.py +47 -0
  45. pulumi_azure/eventgrid/domain.py +2 -2
  46. pulumi_azure/eventgrid/domain_topic.py +2 -2
  47. pulumi_azure/eventgrid/event_subscription.py +2 -2
  48. pulumi_azure/eventgrid/get_domain.py +2 -2
  49. pulumi_azure/eventgrid/get_domain_topic.py +2 -2
  50. pulumi_azure/eventgrid/get_partner_namespace.py +2 -2
  51. pulumi_azure/eventgrid/get_partner_registration.py +2 -2
  52. pulumi_azure/eventgrid/get_system_topic.py +28 -6
  53. pulumi_azure/eventgrid/get_topic.py +2 -2
  54. pulumi_azure/eventgrid/partner_configuration.py +2 -2
  55. pulumi_azure/eventgrid/partner_namespace.py +2 -2
  56. pulumi_azure/eventgrid/partner_registration.py +2 -2
  57. pulumi_azure/eventgrid/system_topic.py +97 -35
  58. pulumi_azure/eventgrid/system_topic_event_subscription.py +4 -4
  59. pulumi_azure/eventgrid/topic.py +2 -2
  60. pulumi_azure/eventhub/domain.py +2 -2
  61. pulumi_azure/eventhub/event_grid_topic.py +2 -2
  62. pulumi_azure/eventhub/event_subscription.py +2 -2
  63. pulumi_azure/hpc/cache_blob_target.py +2 -2
  64. pulumi_azure/iot/_inputs.py +27 -1
  65. pulumi_azure/iot/endpoint_cosmosdb_account.py +64 -3
  66. pulumi_azure/iot/endpoint_eventhub.py +64 -3
  67. pulumi_azure/iot/endpoint_servicebus_queue.py +64 -3
  68. pulumi_azure/iot/endpoint_servicebus_topic.py +64 -3
  69. pulumi_azure/iot/endpoint_storage_container.py +64 -3
  70. pulumi_azure/iot/outputs.py +19 -1
  71. pulumi_azure/keyvault/_inputs.py +3 -17
  72. pulumi_azure/keyvault/get_key_vault.py +13 -1
  73. pulumi_azure/keyvault/key_vault.py +78 -35
  74. pulumi_azure/keyvault/outputs.py +2 -10
  75. pulumi_azure/kusto/_inputs.py +16 -6
  76. pulumi_azure/kusto/cluster.py +95 -66
  77. pulumi_azure/kusto/outputs.py +10 -4
  78. pulumi_azure/lb/get_lb_outbound_rule.py +12 -1
  79. pulumi_azure/lb/get_lb_rule.py +28 -4
  80. pulumi_azure/lb/load_balancer.py +94 -0
  81. pulumi_azure/lb/nat_rule.py +115 -29
  82. pulumi_azure/lb/outbound_rule.py +60 -17
  83. pulumi_azure/lb/rule.py +116 -30
  84. pulumi_azure/loadtest/_inputs.py +6 -3
  85. pulumi_azure/loadtest/load_test.py +0 -4
  86. pulumi_azure/loadtest/outputs.py +4 -2
  87. pulumi_azure/logicapps/_inputs.py +46 -987
  88. pulumi_azure/logicapps/get_standard.py +0 -7
  89. pulumi_azure/logicapps/outputs.py +117 -101
  90. pulumi_azure/logicapps/standard.py +7 -7
  91. pulumi_azure/machinelearning/_inputs.py +24 -4
  92. pulumi_azure/machinelearning/compute_instance.py +35 -7
  93. pulumi_azure/machinelearning/datastore_blobstorage.py +2 -2
  94. pulumi_azure/machinelearning/datastore_datalake_gen2.py +2 -2
  95. pulumi_azure/machinelearning/inference_cluster.py +2 -2
  96. pulumi_azure/machinelearning/outputs.py +17 -3
  97. pulumi_azure/machinelearning/workspace.py +61 -0
  98. pulumi_azure/management/_inputs.py +0 -18
  99. pulumi_azure/management/group_policy_assignment.py +7 -7
  100. pulumi_azure/management/outputs.py +0 -12
  101. pulumi_azure/management/private_link_association.py +0 -70
  102. pulumi_azure/mobile/_inputs.py +14 -6
  103. pulumi_azure/mobile/network_sim.py +2 -6
  104. pulumi_azure/mobile/network_sim_policy.py +2 -6
  105. pulumi_azure/mobile/network_slice.py +116 -31
  106. pulumi_azure/mobile/outputs.py +6 -4
  107. pulumi_azure/monitoring/_inputs.py +15 -9
  108. pulumi_azure/monitoring/activity_log_alert.py +7 -7
  109. pulumi_azure/monitoring/outputs.py +10 -6
  110. pulumi_azure/mssql/job_step.py +11 -11
  111. pulumi_azure/mysql/_inputs.py +20 -0
  112. pulumi_azure/mysql/outputs.py +14 -0
  113. pulumi_azure/netapp/_inputs.py +18 -6
  114. pulumi_azure/netapp/account.py +2 -2
  115. pulumi_azure/netapp/account_encryption.py +132 -4
  116. pulumi_azure/netapp/backup_policy.py +2 -2
  117. pulumi_azure/netapp/backup_vault.py +2 -2
  118. pulumi_azure/netapp/get_account.py +2 -2
  119. pulumi_azure/netapp/get_account_encryption.py +25 -3
  120. pulumi_azure/netapp/get_backup_policy.py +2 -2
  121. pulumi_azure/netapp/get_backup_vault.py +2 -2
  122. pulumi_azure/netapp/get_pool.py +17 -3
  123. pulumi_azure/netapp/get_snapshot.py +2 -2
  124. pulumi_azure/netapp/get_snapshot_policy.py +2 -2
  125. pulumi_azure/netapp/get_volume.py +17 -3
  126. pulumi_azure/netapp/get_volume_group_oracle.py +2 -2
  127. pulumi_azure/netapp/get_volume_group_sap_hana.py +2 -2
  128. pulumi_azure/netapp/get_volume_quota_rule.py +2 -2
  129. pulumi_azure/netapp/outputs.py +12 -4
  130. pulumi_azure/netapp/pool.py +104 -9
  131. pulumi_azure/netapp/snapshot.py +2 -2
  132. pulumi_azure/netapp/snapshot_policy.py +2 -2
  133. pulumi_azure/netapp/volume.py +82 -7
  134. pulumi_azure/netapp/volume_group_oracle.py +2 -2
  135. pulumi_azure/netapp/volume_group_sap_hana.py +2 -2
  136. pulumi_azure/netapp/volume_quota_rule.py +2 -2
  137. pulumi_azure/network/__init__.py +2 -0
  138. pulumi_azure/network/network_manager_ipam_pool_static_cidr.py +415 -0
  139. pulumi_azure/network/network_manager_routing_configuration.py +7 -7
  140. pulumi_azure/network/network_manager_routing_rule_collection.py +429 -0
  141. pulumi_azure/network/subnet.py +76 -1
  142. pulumi_azure/oracle/__init__.py +3 -0
  143. pulumi_azure/oracle/autonomous_database_backup.py +310 -0
  144. pulumi_azure/oracle/get_autonomous_database_backup.py +347 -0
  145. pulumi_azure/oracle/get_autonomous_database_backups.py +138 -0
  146. pulumi_azure/oracle/outputs.py +191 -0
  147. pulumi_azure/paloalto/next_generation_firewall_virtual_hub_local_rulestack.py +2 -2
  148. pulumi_azure/paloalto/next_generation_firewall_virtual_hub_panorama.py +2 -2
  149. pulumi_azure/paloalto/next_generation_firewall_virtual_network_local_rulestack.py +2 -2
  150. pulumi_azure/paloalto/next_generation_firewall_virtual_network_panorama.py +2 -2
  151. pulumi_azure/policy/_inputs.py +6 -0
  152. pulumi_azure/policy/outputs.py +4 -0
  153. pulumi_azure/postgresql/flexible_server.py +7 -7
  154. pulumi_azure/postgresql/flexible_server_firewall_rule.py +14 -14
  155. pulumi_azure/pulumi-plugin.json +1 -1
  156. pulumi_azure/search/service.py +7 -7
  157. pulumi_azure/sentinel/_inputs.py +144 -0
  158. pulumi_azure/sentinel/authomation_rule.py +47 -0
  159. pulumi_azure/sentinel/automation_rule.py +47 -0
  160. pulumi_azure/sentinel/outputs.py +84 -0
  161. pulumi_azure/storage/_inputs.py +3 -3
  162. pulumi_azure/storage/container_immutability_policy.py +2 -2
  163. pulumi_azure/storage/get_queue.py +59 -8
  164. pulumi_azure/storage/outputs.py +2 -2
  165. pulumi_azure/storage/queue.py +159 -27
  166. {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/METADATA +1 -1
  167. {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/RECORD +169 -162
  168. {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/WHEEL +0 -0
  169. {pulumi_azure-6.27.0a1758868424.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/top_level.txt +0 -0
@@ -35,6 +35,7 @@ class KeyVaultArgs:
35
35
  network_acls: Optional[pulumi.Input['KeyVaultNetworkAclsArgs']] = None,
36
36
  public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
37
37
  purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
38
39
  soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
39
40
  tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
40
41
  """
@@ -45,9 +46,6 @@ class KeyVaultArgs:
45
46
  :param pulumi.Input[Sequence[pulumi.Input['KeyVaultAccessPolicyArgs']]] access_policies: A list of up to 1024 objects describing access policies, as described below.
46
47
 
47
48
  > **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
48
- :param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
49
-
50
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
51
49
  :param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
52
50
  :param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
53
51
  :param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
@@ -58,6 +56,9 @@ class KeyVaultArgs:
58
56
  :param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
59
57
 
60
58
  !> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
59
+ :param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
60
+
61
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
61
62
  :param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
62
63
 
63
64
  > **Note:** This field can only be configured one time and cannot be updated.
@@ -69,10 +70,13 @@ class KeyVaultArgs:
69
70
  if access_policies is not None:
70
71
  pulumi.set(__self__, "access_policies", access_policies)
71
72
  if contacts is not None:
72
- warnings.warn("""As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""", DeprecationWarning)
73
- pulumi.log.warn("""contacts is deprecated: As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""")
73
+ warnings.warn("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""", DeprecationWarning)
74
+ pulumi.log.warn("""contacts is deprecated: As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
74
75
  if contacts is not None:
75
76
  pulumi.set(__self__, "contacts", contacts)
77
+ if enable_rbac_authorization is not None:
78
+ warnings.warn("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""", DeprecationWarning)
79
+ pulumi.log.warn("""enable_rbac_authorization is deprecated: This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
76
80
  if enable_rbac_authorization is not None:
77
81
  pulumi.set(__self__, "enable_rbac_authorization", enable_rbac_authorization)
78
82
  if enabled_for_deployment is not None:
@@ -91,6 +95,8 @@ class KeyVaultArgs:
91
95
  pulumi.set(__self__, "public_network_access_enabled", public_network_access_enabled)
92
96
  if purge_protection_enabled is not None:
93
97
  pulumi.set(__self__, "purge_protection_enabled", purge_protection_enabled)
98
+ if rbac_authorization_enabled is not None:
99
+ pulumi.set(__self__, "rbac_authorization_enabled", rbac_authorization_enabled)
94
100
  if soft_delete_retention_days is not None:
95
101
  pulumi.set(__self__, "soft_delete_retention_days", soft_delete_retention_days)
96
102
  if tags is not None:
@@ -148,7 +154,7 @@ class KeyVaultArgs:
148
154
 
149
155
  @_builtins.property
150
156
  @pulumi.getter
151
- @_utilities.deprecated("""As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""")
157
+ @_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
152
158
  def contacts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['KeyVaultContactArgs']]]]:
153
159
  return pulumi.get(self, "contacts")
154
160
 
@@ -158,12 +164,8 @@ class KeyVaultArgs:
158
164
 
159
165
  @_builtins.property
160
166
  @pulumi.getter(name="enableRbacAuthorization")
167
+ @_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
161
168
  def enable_rbac_authorization(self) -> Optional[pulumi.Input[_builtins.bool]]:
162
- """
163
- Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
164
-
165
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
166
- """
167
169
  return pulumi.get(self, "enable_rbac_authorization")
168
170
 
169
171
  @enable_rbac_authorization.setter
@@ -268,6 +270,20 @@ class KeyVaultArgs:
268
270
  def purge_protection_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
269
271
  pulumi.set(self, "purge_protection_enabled", value)
270
272
 
273
+ @_builtins.property
274
+ @pulumi.getter(name="rbacAuthorizationEnabled")
275
+ def rbac_authorization_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
276
+ """
277
+ Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
278
+
279
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
280
+ """
281
+ return pulumi.get(self, "rbac_authorization_enabled")
282
+
283
+ @rbac_authorization_enabled.setter
284
+ def rbac_authorization_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
285
+ pulumi.set(self, "rbac_authorization_enabled", value)
286
+
271
287
  @_builtins.property
272
288
  @pulumi.getter(name="softDeleteRetentionDays")
273
289
  def soft_delete_retention_days(self) -> Optional[pulumi.Input[_builtins.int]]:
@@ -309,6 +325,7 @@ class _KeyVaultState:
309
325
  network_acls: Optional[pulumi.Input['KeyVaultNetworkAclsArgs']] = None,
310
326
  public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
311
327
  purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
328
+ rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
312
329
  resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
313
330
  sku_name: Optional[pulumi.Input[_builtins.str]] = None,
314
331
  soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
@@ -320,9 +337,6 @@ class _KeyVaultState:
320
337
  :param pulumi.Input[Sequence[pulumi.Input['KeyVaultAccessPolicyArgs']]] access_policies: A list of up to 1024 objects describing access policies, as described below.
321
338
 
322
339
  > **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
323
- :param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
324
-
325
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
326
340
  :param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
327
341
  :param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
328
342
  :param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
@@ -333,6 +347,9 @@ class _KeyVaultState:
333
347
  :param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
334
348
 
335
349
  !> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
350
+ :param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
351
+
352
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
336
353
  :param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
337
354
  :param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
338
355
  :param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
@@ -345,10 +362,13 @@ class _KeyVaultState:
345
362
  if access_policies is not None:
346
363
  pulumi.set(__self__, "access_policies", access_policies)
347
364
  if contacts is not None:
348
- warnings.warn("""As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""", DeprecationWarning)
349
- pulumi.log.warn("""contacts is deprecated: As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""")
365
+ warnings.warn("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""", DeprecationWarning)
366
+ pulumi.log.warn("""contacts is deprecated: As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
350
367
  if contacts is not None:
351
368
  pulumi.set(__self__, "contacts", contacts)
369
+ if enable_rbac_authorization is not None:
370
+ warnings.warn("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""", DeprecationWarning)
371
+ pulumi.log.warn("""enable_rbac_authorization is deprecated: This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
352
372
  if enable_rbac_authorization is not None:
353
373
  pulumi.set(__self__, "enable_rbac_authorization", enable_rbac_authorization)
354
374
  if enabled_for_deployment is not None:
@@ -367,6 +387,8 @@ class _KeyVaultState:
367
387
  pulumi.set(__self__, "public_network_access_enabled", public_network_access_enabled)
368
388
  if purge_protection_enabled is not None:
369
389
  pulumi.set(__self__, "purge_protection_enabled", purge_protection_enabled)
390
+ if rbac_authorization_enabled is not None:
391
+ pulumi.set(__self__, "rbac_authorization_enabled", rbac_authorization_enabled)
370
392
  if resource_group_name is not None:
371
393
  pulumi.set(__self__, "resource_group_name", resource_group_name)
372
394
  if sku_name is not None:
@@ -396,7 +418,7 @@ class _KeyVaultState:
396
418
 
397
419
  @_builtins.property
398
420
  @pulumi.getter
399
- @_utilities.deprecated("""As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""")
421
+ @_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
400
422
  def contacts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['KeyVaultContactArgs']]]]:
401
423
  return pulumi.get(self, "contacts")
402
424
 
@@ -406,12 +428,8 @@ class _KeyVaultState:
406
428
 
407
429
  @_builtins.property
408
430
  @pulumi.getter(name="enableRbacAuthorization")
431
+ @_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
409
432
  def enable_rbac_authorization(self) -> Optional[pulumi.Input[_builtins.bool]]:
410
- """
411
- Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
412
-
413
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
414
- """
415
433
  return pulumi.get(self, "enable_rbac_authorization")
416
434
 
417
435
  @enable_rbac_authorization.setter
@@ -516,6 +534,20 @@ class _KeyVaultState:
516
534
  def purge_protection_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
517
535
  pulumi.set(self, "purge_protection_enabled", value)
518
536
 
537
+ @_builtins.property
538
+ @pulumi.getter(name="rbacAuthorizationEnabled")
539
+ def rbac_authorization_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
540
+ """
541
+ Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
542
+
543
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
544
+ """
545
+ return pulumi.get(self, "rbac_authorization_enabled")
546
+
547
+ @rbac_authorization_enabled.setter
548
+ def rbac_authorization_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
549
+ pulumi.set(self, "rbac_authorization_enabled", value)
550
+
519
551
  @_builtins.property
520
552
  @pulumi.getter(name="resourceGroupName")
521
553
  def resource_group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -608,6 +640,7 @@ class KeyVault(pulumi.CustomResource):
608
640
  network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
609
641
  public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
610
642
  purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
643
+ rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
611
644
  resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
612
645
  sku_name: Optional[pulumi.Input[_builtins.str]] = None,
613
646
  soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
@@ -664,9 +697,6 @@ class KeyVault(pulumi.CustomResource):
664
697
  :param pulumi.Input[Sequence[pulumi.Input[Union['KeyVaultAccessPolicyArgs', 'KeyVaultAccessPolicyArgsDict']]]] access_policies: A list of up to 1024 objects describing access policies, as described below.
665
698
 
666
699
  > **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
667
- :param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
668
-
669
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
670
700
  :param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
671
701
  :param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
672
702
  :param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
@@ -677,6 +707,9 @@ class KeyVault(pulumi.CustomResource):
677
707
  :param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
678
708
 
679
709
  !> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
710
+ :param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
711
+
712
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
680
713
  :param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
681
714
  :param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
682
715
  :param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
@@ -762,6 +795,7 @@ class KeyVault(pulumi.CustomResource):
762
795
  network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
763
796
  public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
764
797
  purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
798
+ rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
765
799
  resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
766
800
  sku_name: Optional[pulumi.Input[_builtins.str]] = None,
767
801
  soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
@@ -787,6 +821,7 @@ class KeyVault(pulumi.CustomResource):
787
821
  __props__.__dict__["network_acls"] = network_acls
788
822
  __props__.__dict__["public_network_access_enabled"] = public_network_access_enabled
789
823
  __props__.__dict__["purge_protection_enabled"] = purge_protection_enabled
824
+ __props__.__dict__["rbac_authorization_enabled"] = rbac_authorization_enabled
790
825
  if resource_group_name is None and not opts.urn:
791
826
  raise TypeError("Missing required property 'resource_group_name'")
792
827
  __props__.__dict__["resource_group_name"] = resource_group_name
@@ -820,6 +855,7 @@ class KeyVault(pulumi.CustomResource):
820
855
  network_acls: Optional[pulumi.Input[Union['KeyVaultNetworkAclsArgs', 'KeyVaultNetworkAclsArgsDict']]] = None,
821
856
  public_network_access_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
822
857
  purge_protection_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
858
+ rbac_authorization_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
823
859
  resource_group_name: Optional[pulumi.Input[_builtins.str]] = None,
824
860
  sku_name: Optional[pulumi.Input[_builtins.str]] = None,
825
861
  soft_delete_retention_days: Optional[pulumi.Input[_builtins.int]] = None,
@@ -836,9 +872,6 @@ class KeyVault(pulumi.CustomResource):
836
872
  :param pulumi.Input[Sequence[pulumi.Input[Union['KeyVaultAccessPolicyArgs', 'KeyVaultAccessPolicyArgsDict']]]] access_policies: A list of up to 1024 objects describing access policies, as described below.
837
873
 
838
874
  > **Note:** Since `access_policy` can be configured both inline and via the separate `keyvault.AccessPolicy` resource, we have to explicitly set it to empty slice (`[]`) to remove it.
839
- :param pulumi.Input[_builtins.bool] enable_rbac_authorization: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
840
-
841
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
842
875
  :param pulumi.Input[_builtins.bool] enabled_for_deployment: Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
843
876
  :param pulumi.Input[_builtins.bool] enabled_for_disk_encryption: Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
844
877
  :param pulumi.Input[_builtins.bool] enabled_for_template_deployment: Boolean flag to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
@@ -849,6 +882,9 @@ class KeyVault(pulumi.CustomResource):
849
882
  :param pulumi.Input[_builtins.bool] purge_protection_enabled: Is Purge Protection enabled for this Key Vault?
850
883
 
851
884
  !> **Note:** Once Purge Protection has been Enabled it's not possible to Disable it. Support for [disabling purge protection is being tracked in this Azure API issue](https://github.com/Azure/azure-rest-api-specs/issues/8075). Deleting the Key Vault with Purge Protection Enabled will schedule the Key Vault to be deleted (which will happen by Azure in the configured number of days, currently 90 days).
885
+ :param pulumi.Input[_builtins.bool] rbac_authorization_enabled: Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
886
+
887
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
852
888
  :param pulumi.Input[_builtins.str] resource_group_name: The name of the resource group in which to create the Key Vault. Changing this forces a new resource to be created.
853
889
  :param pulumi.Input[_builtins.str] sku_name: The Name of the SKU used for this Key Vault. Possible values are `standard` and `premium`.
854
890
  :param pulumi.Input[_builtins.int] soft_delete_retention_days: The number of days that items should be retained for once soft-deleted. This value can be between `7` and `90` (the default) days.
@@ -873,6 +909,7 @@ class KeyVault(pulumi.CustomResource):
873
909
  __props__.__dict__["network_acls"] = network_acls
874
910
  __props__.__dict__["public_network_access_enabled"] = public_network_access_enabled
875
911
  __props__.__dict__["purge_protection_enabled"] = purge_protection_enabled
912
+ __props__.__dict__["rbac_authorization_enabled"] = rbac_authorization_enabled
876
913
  __props__.__dict__["resource_group_name"] = resource_group_name
877
914
  __props__.__dict__["sku_name"] = sku_name
878
915
  __props__.__dict__["soft_delete_retention_days"] = soft_delete_retention_days
@@ -893,18 +930,14 @@ class KeyVault(pulumi.CustomResource):
893
930
 
894
931
  @_builtins.property
895
932
  @pulumi.getter
896
- @_utilities.deprecated("""As the `contact` property requires reaching out to the dataplane, to better support private endpoints and keyvaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself.""")
933
+ @_utilities.deprecated("""As the `contact` property uses a data plane API, to better support private endpoints and key vaults with public network access disabled, new key vaults with the `contact` field defined in the configuration file will now be required to use the `keyvault.CertificateContacts` resource instead of the exposed `contact` field in the key vault resource itself. This field will be removed in v5.0 of the provider.""")
897
934
  def contacts(self) -> pulumi.Output[Sequence['outputs.KeyVaultContact']]:
898
935
  return pulumi.get(self, "contacts")
899
936
 
900
937
  @_builtins.property
901
938
  @pulumi.getter(name="enableRbacAuthorization")
902
- def enable_rbac_authorization(self) -> pulumi.Output[Optional[_builtins.bool]]:
903
- """
904
- Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
905
-
906
- > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
907
- """
939
+ @_utilities.deprecated("""This property has been renamed to `rbac_authorization_enabled` and will be removed in v5.0 of the provider""")
940
+ def enable_rbac_authorization(self) -> pulumi.Output[_builtins.bool]:
908
941
  return pulumi.get(self, "enable_rbac_authorization")
909
942
 
910
943
  @_builtins.property
@@ -973,6 +1006,16 @@ class KeyVault(pulumi.CustomResource):
973
1006
  """
974
1007
  return pulumi.get(self, "purge_protection_enabled")
975
1008
 
1009
+ @_builtins.property
1010
+ @pulumi.getter(name="rbacAuthorizationEnabled")
1011
+ def rbac_authorization_enabled(self) -> pulumi.Output[_builtins.bool]:
1012
+ """
1013
+ Boolean flag to specify whether Azure Key Vault uses Role Based Access Control (RBAC) for authorization of data actions.
1014
+
1015
+ > **Note:** Changing the permission model requires unrestricted (no conditions on the role assignment) `Microsoft.Authorization/roleAssignments/write` permission, which is part of the `Owner` and `User Access Administrator` roles. Classic subscription administrator roles like `Service Administrator` and `Co-Administrator`, or restricted `Key Vault Data Access Administrator` cannot be used to change the permission model. For more information, please see the [product documentation](https://learn.microsoft.com/azure/key-vault/general/rbac-guide?tabs=azure-cli#using-azure-rbac-secret-key-and-certificate-permissions-with-key-vault:~:text=Enable%20Azure%20RBAC,change%20permission%20model).
1016
+ """
1017
+ return pulumi.get(self, "rbac_authorization_enabled")
1018
+
976
1019
  @_builtins.property
977
1020
  @pulumi.getter(name="resourceGroupName")
978
1021
  def resource_group_name(self) -> pulumi.Output[_builtins.str]:
@@ -1734,9 +1734,7 @@ class KeyVaultContact(dict):
1734
1734
  name: Optional[_builtins.str] = None,
1735
1735
  phone: Optional[_builtins.str] = None):
1736
1736
  """
1737
- :param _builtins.str email: E-mail address of the contact.
1738
- :param _builtins.str name: Name of the contact.
1739
- :param _builtins.str phone: Phone number of the contact.
1737
+ :param _builtins.str name: Specifies the name of the Key Vault. Changing this forces a new resource to be created. The name must be globally unique. If the vault is in a recoverable state then the vault will need to be purged before reusing the name.
1740
1738
  """
1741
1739
  pulumi.set(__self__, "email", email)
1742
1740
  if name is not None:
@@ -1747,25 +1745,19 @@ class KeyVaultContact(dict):
1747
1745
  @_builtins.property
1748
1746
  @pulumi.getter
1749
1747
  def email(self) -> _builtins.str:
1750
- """
1751
- E-mail address of the contact.
1752
- """
1753
1748
  return pulumi.get(self, "email")
1754
1749
 
1755
1750
  @_builtins.property
1756
1751
  @pulumi.getter
1757
1752
  def name(self) -> Optional[_builtins.str]:
1758
1753
  """
1759
- Name of the contact.
1754
+ Specifies the name of the Key Vault. Changing this forces a new resource to be created. The name must be globally unique. If the vault is in a recoverable state then the vault will need to be purged before reusing the name.
1760
1755
  """
1761
1756
  return pulumi.get(self, "name")
1762
1757
 
1763
1758
  @_builtins.property
1764
1759
  @pulumi.getter
1765
1760
  def phone(self) -> Optional[_builtins.str]:
1766
- """
1767
- Phone number of the contact.
1768
- """
1769
1761
  return pulumi.get(self, "phone")
1770
1762
 
1771
1763
 
@@ -263,6 +263,9 @@ class ClusterIdentityArgs:
263
263
  if not MYPY:
264
264
  class ClusterLanguageExtensionArgsDict(TypedDict):
265
265
  image: pulumi.Input[_builtins.str]
266
+ """
267
+ The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
268
+ """
266
269
  name: pulumi.Input[_builtins.str]
267
270
  """
268
271
  The name of the Kusto Cluster to create. Only lowercase Alphanumeric characters allowed, starting with a letter. Changing this forces a new resource to be created.
@@ -276,6 +279,7 @@ class ClusterLanguageExtensionArgs:
276
279
  image: pulumi.Input[_builtins.str],
277
280
  name: pulumi.Input[_builtins.str]):
278
281
  """
282
+ :param pulumi.Input[_builtins.str] image: The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
279
283
  :param pulumi.Input[_builtins.str] name: The name of the Kusto Cluster to create. Only lowercase Alphanumeric characters allowed, starting with a letter. Changing this forces a new resource to be created.
280
284
  """
281
285
  pulumi.set(__self__, "image", image)
@@ -284,6 +288,9 @@ class ClusterLanguageExtensionArgs:
284
288
  @_builtins.property
285
289
  @pulumi.getter
286
290
  def image(self) -> pulumi.Input[_builtins.str]:
291
+ """
292
+ The language extension image. Possible values are `Python3_11_7`, `Python3_11_7_DL`, `Python3_10_8`, `Python3_10_8_DL`, `Python3_6_5`, `PythonCustomImage`, and `R`.
293
+ """
287
294
  return pulumi.get(self, "image")
288
295
 
289
296
  @image.setter
@@ -307,11 +314,11 @@ if not MYPY:
307
314
  class ClusterOptimizedAutoScaleArgsDict(TypedDict):
308
315
  maximum_instances: pulumi.Input[_builtins.int]
309
316
  """
310
- The maximum number of allowed instances. Must between `0` and `1000`.
317
+ The maximum number of allowed instances. Possible values range between `0` and `1000`.
311
318
  """
312
319
  minimum_instances: pulumi.Input[_builtins.int]
313
320
  """
314
- The minimum number of allowed instances. Must between `0` and `1000`.
321
+ The minimum number of allowed instances. Possible values range between `0` and `1000`.
315
322
  """
316
323
  elif False:
317
324
  ClusterOptimizedAutoScaleArgsDict: TypeAlias = Mapping[str, Any]
@@ -322,8 +329,8 @@ class ClusterOptimizedAutoScaleArgs:
322
329
  maximum_instances: pulumi.Input[_builtins.int],
323
330
  minimum_instances: pulumi.Input[_builtins.int]):
324
331
  """
325
- :param pulumi.Input[_builtins.int] maximum_instances: The maximum number of allowed instances. Must between `0` and `1000`.
326
- :param pulumi.Input[_builtins.int] minimum_instances: The minimum number of allowed instances. Must between `0` and `1000`.
332
+ :param pulumi.Input[_builtins.int] maximum_instances: The maximum number of allowed instances. Possible values range between `0` and `1000`.
333
+ :param pulumi.Input[_builtins.int] minimum_instances: The minimum number of allowed instances. Possible values range between `0` and `1000`.
327
334
  """
328
335
  pulumi.set(__self__, "maximum_instances", maximum_instances)
329
336
  pulumi.set(__self__, "minimum_instances", minimum_instances)
@@ -332,7 +339,7 @@ class ClusterOptimizedAutoScaleArgs:
332
339
  @pulumi.getter(name="maximumInstances")
333
340
  def maximum_instances(self) -> pulumi.Input[_builtins.int]:
334
341
  """
335
- The maximum number of allowed instances. Must between `0` and `1000`.
342
+ The maximum number of allowed instances. Possible values range between `0` and `1000`.
336
343
  """
337
344
  return pulumi.get(self, "maximum_instances")
338
345
 
@@ -344,7 +351,7 @@ class ClusterOptimizedAutoScaleArgs:
344
351
  @pulumi.getter(name="minimumInstances")
345
352
  def minimum_instances(self) -> pulumi.Input[_builtins.int]:
346
353
  """
347
- The minimum number of allowed instances. Must between `0` and `1000`.
354
+ The minimum number of allowed instances. Possible values range between `0` and `1000`.
348
355
  """
349
356
  return pulumi.get(self, "minimum_instances")
350
357
 
@@ -364,6 +371,7 @@ if not MYPY:
364
371
  Specifies the node count for the cluster. Boundaries depend on the SKU name.
365
372
 
366
373
  > **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
374
+
367
375
  > **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
368
376
  """
369
377
  elif False:
@@ -379,6 +387,7 @@ class ClusterSkuArgs:
379
387
  :param pulumi.Input[_builtins.int] capacity: Specifies the node count for the cluster. Boundaries depend on the SKU name.
380
388
 
381
389
  > **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
390
+
382
391
  > **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
383
392
  """
384
393
  pulumi.set(__self__, "name", name)
@@ -404,6 +413,7 @@ class ClusterSkuArgs:
404
413
  Specifies the node count for the cluster. Boundaries depend on the SKU name.
405
414
 
406
415
  > **Note:** If no `optimized_auto_scale` block is defined, then the capacity is required.
416
+
407
417
  > **Note:** If an `optimized_auto_scale` block is defined and no capacity is set, then the capacity is initially set to the value of `minimum_instances`.
408
418
  """
409
419
  return pulumi.get(self, "capacity")