You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fromfixlib.json_benderimportBender, S, ForallBend, Bend
20
21
fromfixlib.typesimportJson
@@ -166,24 +167,24 @@ class AzureKeyVaultPrivateEndpointConnectionItem:
166
167
167
168
168
169
@define(eq=False, slots=False)
169
-
classAzureKeyAttributes:
170
-
kind: ClassVar[str] ="azure_key_attributes"
170
+
classAzureKeyVaultAttributes:
171
+
kind: ClassVar[str] ="azure_key_vault_attributes"
171
172
mapping: ClassVar[Dict[str, Bender]] = {
172
-
"created": S("created"),
173
+
"created": S("created")>>TimestampToIso,
173
174
"enabled": S("enabled"),
174
-
"exp": S("exp"),
175
+
"expire": S("exp")>>TimestampToIso,
175
176
"exportable": S("exportable"),
176
177
"nbf": S("nbf"),
177
178
"recovery_level": S("recoveryLevel"),
178
-
"updated": S("updated"),
179
+
"updated": S("updated")>>TimestampToIso,
179
180
}
180
-
created: Optional[int] =field(default=None, metadata={'description': 'Creation time in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
181
+
created: Optional[datetime] =field(default=None, metadata={'description': 'Creation time in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
181
182
enabled: Optional[bool] =field(default=None, metadata={'description': 'Determines whether or not the object is enabled.'}) # fmt: skip
182
-
exp: Optional[int] =field(default=None, metadata={'description': 'Expiry date in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
183
+
expire: Optional[datetime] =field(default=None, metadata={'description': 'Expiry date in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
183
184
exportable: Optional[bool] =field(default=None, metadata={'description': 'Indicates if the private key can be exported.'}) # fmt: skip
184
185
nbf: Optional[int] =field(default=None, metadata={'description': 'Not before date in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
185
186
recovery_level: Optional[str] =field(default=None, metadata={'description': 'The deletion recovery level currently in effect for the object. If it contains Purgeable , then the object can be permanently deleted by a privileged user; otherwise, only the system can purge the object at the end of the retention interval.'}) # fmt: skip
186
-
updated: Optional[int] =field(default=None, metadata={'description': 'Last updated time in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
187
+
updated: Optional[datetime] =field(default=None, metadata={'description': 'Last updated time in seconds since 1970-01-01T00:00:00Z.'}) # fmt: skip
187
188
188
189
189
190
@define(eq=False, slots=False)
@@ -222,8 +223,8 @@ class AzureKeyVaultLifetimeAction:
content_type: Optional[str] =field(default=None, metadata={"description": "The content type of the secret."})
262
+
secret_uri: Optional[str] =field(default=None, metadata={'description': 'The URI to retrieve the current version of the secret.'}) # fmt: skip
263
+
secret_uri_with_version: Optional[str] =field(default=None, metadata={'description': 'The URI to retrieve the specific version of the secret.'}) # fmt: skip
264
+
value: Optional[str] =field(default=None, metadata={'description': 'The value of the secret. NOTE: value will never be returned from the service, as APIs using this model are is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.'}) # fmt: skip
265
+
266
+
243
267
@define(eq=False, slots=False)
244
268
classAzureManagedHsm(MicrosoftResource):
245
269
kind: ClassVar[str] ="azure_managed_hsm"
@@ -308,25 +332,27 @@ class AzureKey(MicrosoftResource):
@@ -372,9 +398,9 @@ class AzureKeyVault(MicrosoftResource):
372
398
}
373
399
access_policies: Optional[List[AzureAccessKeyVaultPolicyEntry]] =field(default=None, metadata={'description': 'An array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault s tenant ID. When `createMode` is set to `recover`, access policies are not required. Otherwise, access policies are required.'}) # fmt: skip
374
400
create_mode: Optional[str] =field(default=None, metadata={'description': 'The vault s create mode to indicate whether the vault need to be recovered or not.'}) # fmt: skip
375
-
enable_purge_protection: Optional[bool] =field(default=None, metadata={'description': 'Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.'}) # fmt: skip
376
-
enable_rbac_authorization: Optional[bool] =field(default=None, metadata={'description': 'Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.'}) # fmt: skip
377
-
enable_soft_delete: Optional[bool] =field(default=None, metadata={'description': 'Property to specify whether the soft delete functionality is enabled for this key vault. If it s not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.'}) # fmt: skip
401
+
purge_protection: Optional[bool] =field(default=None, metadata={'description': 'Property specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.'}) # fmt: skip
402
+
rbac_authorization: Optional[bool] =field(default=None, metadata={'description': 'Property that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored. When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.'}) # fmt: skip
403
+
soft_delete: Optional[bool] =field(default=None, metadata={'description': 'Property to specify whether the soft delete functionality is enabled for this key vault. If it s not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.'}) # fmt: skip
378
404
enabled_for_deployment: Optional[bool] =field(default=None, metadata={'description': 'Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.'}) # fmt: skip
379
405
enabled_for_disk_encryption: Optional[bool] =field(default=None, metadata={'description': 'Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.'}) # fmt: skip
380
406
enabled_for_template_deployment: Optional[bool] =field(default=None, metadata={'description': 'Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.'}) # fmt: skip
@@ -389,22 +415,23 @@ class AzureKeyVault(MicrosoftResource):
389
415
vault_uri: Optional[str] =field(default=None, metadata={'description': 'The URI of the vault for performing operations on keys and secrets.'}) # fmt: skip
0 commit comments