@volcengine/pulumi 0.0.45 → 0.0.46

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (146) hide show
  1. package/kms/asymmetricCiphertext.d.ts +129 -0
  2. package/kms/asymmetricCiphertext.js +90 -0
  3. package/kms/asymmetricCiphertext.js.map +1 -0
  4. package/kms/asymmetricCiphertexts.d.ts +129 -0
  5. package/kms/asymmetricCiphertexts.js +69 -0
  6. package/kms/asymmetricCiphertexts.js.map +1 -0
  7. package/kms/asymmetricPlaintexts.d.ts +129 -0
  8. package/kms/asymmetricPlaintexts.js +69 -0
  9. package/kms/asymmetricPlaintexts.js.map +1 -0
  10. package/kms/asymmetricSignature.d.ts +142 -0
  11. package/kms/asymmetricSignature.js +93 -0
  12. package/kms/asymmetricSignature.js.map +1 -0
  13. package/kms/asymmetricSignatures.d.ts +140 -0
  14. package/kms/asymmetricSignatures.js +72 -0
  15. package/kms/asymmetricSignatures.js.map +1 -0
  16. package/kms/asymmetricVerifications.d.ts +139 -0
  17. package/kms/asymmetricVerifications.js +63 -0
  18. package/kms/asymmetricVerifications.js.map +1 -0
  19. package/kms/cancelKeyDeletion.d.ts +105 -0
  20. package/kms/cancelKeyDeletion.js +80 -0
  21. package/kms/cancelKeyDeletion.js.map +1 -0
  22. package/kms/cancelSecretDeletion.d.ts +75 -0
  23. package/kms/cancelSecretDeletion.js +73 -0
  24. package/kms/cancelSecretDeletion.js.map +1 -0
  25. package/kms/ciphertext.d.ts +122 -0
  26. package/kms/ciphertext.js +80 -0
  27. package/kms/ciphertext.js.map +1 -0
  28. package/kms/ciphertexts.d.ts +115 -0
  29. package/kms/ciphertexts.js +55 -0
  30. package/kms/ciphertexts.js.map +1 -0
  31. package/kms/dataKeys.d.ts +121 -0
  32. package/kms/dataKeys.js +62 -0
  33. package/kms/dataKeys.js.map +1 -0
  34. package/kms/getAsymmetricCiphertexts.d.ts +127 -0
  35. package/kms/getAsymmetricCiphertexts.js +66 -0
  36. package/kms/getAsymmetricCiphertexts.js.map +1 -0
  37. package/kms/getAsymmetricPlaintexts.d.ts +127 -0
  38. package/kms/getAsymmetricPlaintexts.js +66 -0
  39. package/kms/getAsymmetricPlaintexts.js.map +1 -0
  40. package/kms/getAsymmetricSignatures.d.ts +138 -0
  41. package/kms/getAsymmetricSignatures.js +69 -0
  42. package/kms/getAsymmetricSignatures.js.map +1 -0
  43. package/kms/getAsymmetricVerifications.d.ts +137 -0
  44. package/kms/getAsymmetricVerifications.js +60 -0
  45. package/kms/getAsymmetricVerifications.js.map +1 -0
  46. package/kms/getCiphertexts.d.ts +113 -0
  47. package/kms/getCiphertexts.js +52 -0
  48. package/kms/getCiphertexts.js.map +1 -0
  49. package/kms/getDataKeys.d.ts +119 -0
  50. package/kms/getDataKeys.js +59 -0
  51. package/kms/getDataKeys.js.map +1 -0
  52. package/kms/getKeyMaterials.d.ts +120 -0
  53. package/kms/getKeyMaterials.js +57 -0
  54. package/kms/getKeyMaterials.js.map +1 -0
  55. package/kms/getKeys.d.ts +10 -10
  56. package/kms/getMacVerifications.d.ts +139 -0
  57. package/kms/getMacVerifications.js +67 -0
  58. package/kms/getMacVerifications.js.map +1 -0
  59. package/kms/getMacs.d.ts +130 -0
  60. package/kms/getMacs.js +66 -0
  61. package/kms/getMacs.js.map +1 -0
  62. package/kms/getPlaintexts.d.ts +94 -0
  63. package/kms/getPlaintexts.js +57 -0
  64. package/kms/getPlaintexts.js.map +1 -0
  65. package/kms/getPublicKeys.d.ts +98 -0
  66. package/kms/getPublicKeys.js +51 -0
  67. package/kms/getPublicKeys.js.map +1 -0
  68. package/kms/getReEncrypts.d.ts +132 -0
  69. package/kms/getReEncrypts.js +63 -0
  70. package/kms/getReEncrypts.js.map +1 -0
  71. package/kms/getRegions.d.ts +62 -0
  72. package/kms/getRegions.js +42 -0
  73. package/kms/getRegions.js.map +1 -0
  74. package/kms/getSecretVersions.d.ts +75 -0
  75. package/kms/getSecretVersions.js +46 -0
  76. package/kms/getSecretVersions.js.map +1 -0
  77. package/kms/getSecrets.d.ts +12 -0
  78. package/kms/getSecrets.js +1 -0
  79. package/kms/getSecrets.js.map +1 -1
  80. package/kms/index.d.ts +120 -0
  81. package/kms/index.js +146 -1
  82. package/kms/index.js.map +1 -1
  83. package/kms/key.d.ts +98 -24
  84. package/kms/key.js +44 -0
  85. package/kms/key.js.map +1 -1
  86. package/kms/keyArchive.d.ts +6 -6
  87. package/kms/keyEnable.d.ts +6 -6
  88. package/kms/keyMaterial.d.ts +141 -0
  89. package/kms/keyMaterial.js +88 -0
  90. package/kms/keyMaterial.js.map +1 -0
  91. package/kms/keyMaterials.d.ts +122 -0
  92. package/kms/keyMaterials.js +60 -0
  93. package/kms/keyMaterials.js.map +1 -0
  94. package/kms/keyPrimaryRegion.d.ts +113 -0
  95. package/kms/keyPrimaryRegion.js +87 -0
  96. package/kms/keyPrimaryRegion.js.map +1 -0
  97. package/kms/keyRotation.d.ts +22 -7
  98. package/kms/keyRotation.js +6 -1
  99. package/kms/keyRotation.js.map +1 -1
  100. package/kms/keyring.d.ts +3 -3
  101. package/kms/keys.d.ts +10 -10
  102. package/kms/macVerifications.d.ts +141 -0
  103. package/kms/macVerifications.js +70 -0
  104. package/kms/macVerifications.js.map +1 -0
  105. package/kms/macs.d.ts +132 -0
  106. package/kms/macs.js +69 -0
  107. package/kms/macs.js.map +1 -0
  108. package/kms/plaintexts.d.ts +96 -0
  109. package/kms/plaintexts.js +60 -0
  110. package/kms/plaintexts.js.map +1 -0
  111. package/kms/publicKeys.d.ts +100 -0
  112. package/kms/publicKeys.js +54 -0
  113. package/kms/publicKeys.js.map +1 -0
  114. package/kms/reEncrypt.d.ts +138 -0
  115. package/kms/reEncrypt.js +86 -0
  116. package/kms/reEncrypt.js.map +1 -0
  117. package/kms/reEncrypts.d.ts +134 -0
  118. package/kms/reEncrypts.js +66 -0
  119. package/kms/reEncrypts.js.map +1 -0
  120. package/kms/regions.d.ts +64 -0
  121. package/kms/regions.js +45 -0
  122. package/kms/regions.js.map +1 -0
  123. package/kms/replicateKey.d.ts +144 -0
  124. package/kms/replicateKey.js +90 -0
  125. package/kms/replicateKey.js.map +1 -0
  126. package/kms/secret.d.ts +70 -12
  127. package/kms/secret.js +22 -0
  128. package/kms/secret.js.map +1 -1
  129. package/kms/secretBackup.d.ts +91 -0
  130. package/kms/secretBackup.js +77 -0
  131. package/kms/secretBackup.js.map +1 -0
  132. package/kms/secretRestore.d.ts +92 -0
  133. package/kms/secretRestore.js +82 -0
  134. package/kms/secretRestore.js.map +1 -0
  135. package/kms/secretRotate.d.ts +82 -0
  136. package/kms/secretRotate.js +76 -0
  137. package/kms/secretRotate.js.map +1 -0
  138. package/kms/secretVersions.d.ts +77 -0
  139. package/kms/secretVersions.js +49 -0
  140. package/kms/secretVersions.js.map +1 -0
  141. package/kms/secrets.d.ts +12 -0
  142. package/kms/secrets.js +1 -0
  143. package/kms/secrets.js.map +1 -1
  144. package/package.json +1 -1
  145. package/types/input.d.ts +10 -0
  146. package/types/output.d.ts +304 -10
@@ -0,0 +1,119 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "../types/output";
3
+ /**
4
+ * Use this data source to query detailed information of kms data keys
5
+ * ## Example Usage
6
+ *
7
+ * ```typescript
8
+ * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as volcengine from "@pulumi/volcengine";
10
+ *
11
+ * const dataKey = volcengine.kms.getDataKeys({
12
+ * keyId: "c44870c3-f33b-421a-****-a2bba37c993e",
13
+ * numberOfBytes: 1024,
14
+ * });
15
+ * const default = dataKey.then(dataKey => volcengine.kms.getPlaintexts({
16
+ * ciphertextBlob: dataKey.dataKeyInfos?.[0]?.ciphertextBlob,
17
+ * }));
18
+ * ```
19
+ */
20
+ export declare function getDataKeys(args?: GetDataKeysArgs, opts?: pulumi.InvokeOptions): Promise<GetDataKeysResult>;
21
+ /**
22
+ * A collection of arguments for invoking getDataKeys.
23
+ */
24
+ export interface GetDataKeysArgs {
25
+ /**
26
+ * The JSON string of key/value pairs.
27
+ */
28
+ encryptionContext?: string;
29
+ /**
30
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
31
+ */
32
+ keyId?: string;
33
+ /**
34
+ * The name of the key. Only symmetric key is supported.
35
+ */
36
+ keyName?: string;
37
+ /**
38
+ * The name of the keyring.
39
+ */
40
+ keyringName?: string;
41
+ /**
42
+ * The length of data key to generate.
43
+ */
44
+ numberOfBytes?: number;
45
+ /**
46
+ * File name where to save data source results.
47
+ */
48
+ outputFile?: string;
49
+ }
50
+ /**
51
+ * A collection of values returned by getDataKeys.
52
+ */
53
+ export interface GetDataKeysResult {
54
+ /**
55
+ * The data key info.
56
+ */
57
+ readonly dataKeyInfos: outputs.kms.GetDataKeysDataKeyInfo[];
58
+ readonly encryptionContext?: string;
59
+ /**
60
+ * The provider-assigned unique ID for this managed resource.
61
+ */
62
+ readonly id: string;
63
+ readonly keyId?: string;
64
+ readonly keyName?: string;
65
+ readonly keyringName?: string;
66
+ readonly numberOfBytes?: number;
67
+ readonly outputFile?: string;
68
+ /**
69
+ * The total count of query.
70
+ */
71
+ readonly totalCount: number;
72
+ }
73
+ /**
74
+ * Use this data source to query detailed information of kms data keys
75
+ * ## Example Usage
76
+ *
77
+ * ```typescript
78
+ * import * as pulumi from "@pulumi/pulumi";
79
+ * import * as volcengine from "@pulumi/volcengine";
80
+ *
81
+ * const dataKey = volcengine.kms.getDataKeys({
82
+ * keyId: "c44870c3-f33b-421a-****-a2bba37c993e",
83
+ * numberOfBytes: 1024,
84
+ * });
85
+ * const default = dataKey.then(dataKey => volcengine.kms.getPlaintexts({
86
+ * ciphertextBlob: dataKey.dataKeyInfos?.[0]?.ciphertextBlob,
87
+ * }));
88
+ * ```
89
+ */
90
+ export declare function getDataKeysOutput(args?: GetDataKeysOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetDataKeysResult>;
91
+ /**
92
+ * A collection of arguments for invoking getDataKeys.
93
+ */
94
+ export interface GetDataKeysOutputArgs {
95
+ /**
96
+ * The JSON string of key/value pairs.
97
+ */
98
+ encryptionContext?: pulumi.Input<string>;
99
+ /**
100
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
101
+ */
102
+ keyId?: pulumi.Input<string>;
103
+ /**
104
+ * The name of the key. Only symmetric key is supported.
105
+ */
106
+ keyName?: pulumi.Input<string>;
107
+ /**
108
+ * The name of the keyring.
109
+ */
110
+ keyringName?: pulumi.Input<string>;
111
+ /**
112
+ * The length of data key to generate.
113
+ */
114
+ numberOfBytes?: pulumi.Input<number>;
115
+ /**
116
+ * File name where to save data source results.
117
+ */
118
+ outputFile?: pulumi.Input<string>;
119
+ }
@@ -0,0 +1,59 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getDataKeysOutput = exports.getDataKeys = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Use this data source to query detailed information of kms data keys
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@pulumi/volcengine";
15
+ *
16
+ * const dataKey = volcengine.kms.getDataKeys({
17
+ * keyId: "c44870c3-f33b-421a-****-a2bba37c993e",
18
+ * numberOfBytes: 1024,
19
+ * });
20
+ * const default = dataKey.then(dataKey => volcengine.kms.getPlaintexts({
21
+ * ciphertextBlob: dataKey.dataKeyInfos?.[0]?.ciphertextBlob,
22
+ * }));
23
+ * ```
24
+ */
25
+ function getDataKeys(args, opts) {
26
+ args = args || {};
27
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
28
+ return pulumi.runtime.invoke("volcengine:kms/getDataKeys:getDataKeys", {
29
+ "encryptionContext": args.encryptionContext,
30
+ "keyId": args.keyId,
31
+ "keyName": args.keyName,
32
+ "keyringName": args.keyringName,
33
+ "numberOfBytes": args.numberOfBytes,
34
+ "outputFile": args.outputFile,
35
+ }, opts);
36
+ }
37
+ exports.getDataKeys = getDataKeys;
38
+ /**
39
+ * Use this data source to query detailed information of kms data keys
40
+ * ## Example Usage
41
+ *
42
+ * ```typescript
43
+ * import * as pulumi from "@pulumi/pulumi";
44
+ * import * as volcengine from "@pulumi/volcengine";
45
+ *
46
+ * const dataKey = volcengine.kms.getDataKeys({
47
+ * keyId: "c44870c3-f33b-421a-****-a2bba37c993e",
48
+ * numberOfBytes: 1024,
49
+ * });
50
+ * const default = dataKey.then(dataKey => volcengine.kms.getPlaintexts({
51
+ * ciphertextBlob: dataKey.dataKeyInfos?.[0]?.ciphertextBlob,
52
+ * }));
53
+ * ```
54
+ */
55
+ function getDataKeysOutput(args, opts) {
56
+ return pulumi.output(args).apply((a) => getDataKeys(a, opts));
57
+ }
58
+ exports.getDataKeysOutput = getDataKeysOutput;
59
+ //# sourceMappingURL=getDataKeys.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getDataKeys.js","sourceRoot":"","sources":["../../kms/getDataKeys.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;GAgBG;AACH,SAAgB,WAAW,CAAC,IAAsB,EAAE,IAA2B;IAC3E,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wCAAwC,EAAE;QACnE,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,kCAYC;AAuDD;;;;;;;;;;;;;;;;GAgBG;AACH,SAAgB,iBAAiB,CAAC,IAA4B,EAAE,IAA2B;IACvF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,WAAW,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,8CAEC"}
@@ -0,0 +1,120 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "../types/output";
3
+ /**
4
+ * Use this data source to query detailed information of kms key materials
5
+ * ## Example Usage
6
+ *
7
+ * ```typescript
8
+ * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as volcengine from "@pulumi/volcengine";
10
+ *
11
+ * const default = volcengine.kms.getKeyMaterials({
12
+ * keyName: "Test-3",
13
+ * keyringName: "Tf-test-1",
14
+ * wrappingAlgorithm: "RSAES_OAEP_SHA_256",
15
+ * wrappingKeySpec: "RSA_2048",
16
+ * });
17
+ * ```
18
+ */
19
+ export declare function getKeyMaterials(args?: GetKeyMaterialsArgs, opts?: pulumi.InvokeOptions): Promise<GetKeyMaterialsResult>;
20
+ /**
21
+ * A collection of arguments for invoking getKeyMaterials.
22
+ */
23
+ export interface GetKeyMaterialsArgs {
24
+ /**
25
+ * The id of key. When keyId is not specified, both keyringName and keyName must be specified.
26
+ */
27
+ keyId?: string;
28
+ /**
29
+ * The name of key.
30
+ */
31
+ keyName?: string;
32
+ /**
33
+ * The name of keyring.
34
+ */
35
+ keyringName?: string;
36
+ /**
37
+ * File name where to save data source results.
38
+ */
39
+ outputFile?: string;
40
+ /**
41
+ * The wrapping algorithm. Valid values: `RSAES_OAEP_SHA_256`, `RSAES_OAEP_SHA_1`, `RSAES_PKCS1_V1_5`, `SM2PKE`. Default value: `RSAES_OAEP_SHA_256`. When the wrappingKeySpec is EC_SM2, only SM2PKE is supported.
42
+ */
43
+ wrappingAlgorithm?: string;
44
+ /**
45
+ * The wrapping key spec. Valid values: `RSA_2048`, `EC_SM2`. Default value: `RSA_2048`. When the user's master key protection level is SOFTWARE, selecting EC_SM2 is prohibited.
46
+ */
47
+ wrappingKeySpec?: string;
48
+ }
49
+ /**
50
+ * A collection of values returned by getKeyMaterials.
51
+ */
52
+ export interface GetKeyMaterialsResult {
53
+ /**
54
+ * The provider-assigned unique ID for this managed resource.
55
+ */
56
+ readonly id: string;
57
+ /**
58
+ * The import parameters info.
59
+ */
60
+ readonly importParameters: outputs.kms.GetKeyMaterialsImportParameter[];
61
+ /**
62
+ * The id of key.
63
+ */
64
+ readonly keyId?: string;
65
+ readonly keyName?: string;
66
+ readonly keyringName?: string;
67
+ readonly outputFile?: string;
68
+ /**
69
+ * The total count of query.
70
+ */
71
+ readonly totalCount: number;
72
+ readonly wrappingAlgorithm?: string;
73
+ readonly wrappingKeySpec?: string;
74
+ }
75
+ /**
76
+ * Use this data source to query detailed information of kms key materials
77
+ * ## Example Usage
78
+ *
79
+ * ```typescript
80
+ * import * as pulumi from "@pulumi/pulumi";
81
+ * import * as volcengine from "@pulumi/volcengine";
82
+ *
83
+ * const default = volcengine.kms.getKeyMaterials({
84
+ * keyName: "Test-3",
85
+ * keyringName: "Tf-test-1",
86
+ * wrappingAlgorithm: "RSAES_OAEP_SHA_256",
87
+ * wrappingKeySpec: "RSA_2048",
88
+ * });
89
+ * ```
90
+ */
91
+ export declare function getKeyMaterialsOutput(args?: GetKeyMaterialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetKeyMaterialsResult>;
92
+ /**
93
+ * A collection of arguments for invoking getKeyMaterials.
94
+ */
95
+ export interface GetKeyMaterialsOutputArgs {
96
+ /**
97
+ * The id of key. When keyId is not specified, both keyringName and keyName must be specified.
98
+ */
99
+ keyId?: pulumi.Input<string>;
100
+ /**
101
+ * The name of key.
102
+ */
103
+ keyName?: pulumi.Input<string>;
104
+ /**
105
+ * The name of keyring.
106
+ */
107
+ keyringName?: pulumi.Input<string>;
108
+ /**
109
+ * File name where to save data source results.
110
+ */
111
+ outputFile?: pulumi.Input<string>;
112
+ /**
113
+ * The wrapping algorithm. Valid values: `RSAES_OAEP_SHA_256`, `RSAES_OAEP_SHA_1`, `RSAES_PKCS1_V1_5`, `SM2PKE`. Default value: `RSAES_OAEP_SHA_256`. When the wrappingKeySpec is EC_SM2, only SM2PKE is supported.
114
+ */
115
+ wrappingAlgorithm?: pulumi.Input<string>;
116
+ /**
117
+ * The wrapping key spec. Valid values: `RSA_2048`, `EC_SM2`. Default value: `RSA_2048`. When the user's master key protection level is SOFTWARE, selecting EC_SM2 is prohibited.
118
+ */
119
+ wrappingKeySpec?: pulumi.Input<string>;
120
+ }
@@ -0,0 +1,57 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getKeyMaterialsOutput = exports.getKeyMaterials = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Use this data source to query detailed information of kms key materials
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@pulumi/volcengine";
15
+ *
16
+ * const default = volcengine.kms.getKeyMaterials({
17
+ * keyName: "Test-3",
18
+ * keyringName: "Tf-test-1",
19
+ * wrappingAlgorithm: "RSAES_OAEP_SHA_256",
20
+ * wrappingKeySpec: "RSA_2048",
21
+ * });
22
+ * ```
23
+ */
24
+ function getKeyMaterials(args, opts) {
25
+ args = args || {};
26
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
27
+ return pulumi.runtime.invoke("volcengine:kms/getKeyMaterials:getKeyMaterials", {
28
+ "keyId": args.keyId,
29
+ "keyName": args.keyName,
30
+ "keyringName": args.keyringName,
31
+ "outputFile": args.outputFile,
32
+ "wrappingAlgorithm": args.wrappingAlgorithm,
33
+ "wrappingKeySpec": args.wrappingKeySpec,
34
+ }, opts);
35
+ }
36
+ exports.getKeyMaterials = getKeyMaterials;
37
+ /**
38
+ * Use this data source to query detailed information of kms key materials
39
+ * ## Example Usage
40
+ *
41
+ * ```typescript
42
+ * import * as pulumi from "@pulumi/pulumi";
43
+ * import * as volcengine from "@pulumi/volcengine";
44
+ *
45
+ * const default = volcengine.kms.getKeyMaterials({
46
+ * keyName: "Test-3",
47
+ * keyringName: "Tf-test-1",
48
+ * wrappingAlgorithm: "RSAES_OAEP_SHA_256",
49
+ * wrappingKeySpec: "RSA_2048",
50
+ * });
51
+ * ```
52
+ */
53
+ function getKeyMaterialsOutput(args, opts) {
54
+ return pulumi.output(args).apply((a) => getKeyMaterials(a, opts));
55
+ }
56
+ exports.getKeyMaterialsOutput = getKeyMaterialsOutput;
57
+ //# sourceMappingURL=getKeyMaterials.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getKeyMaterials.js","sourceRoot":"","sources":["../../kms/getKeyMaterials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,eAAe,CAAC,IAA0B,EAAE,IAA2B;IACnF,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,iBAAiB,EAAE,IAAI,CAAC,eAAe;KAC1C,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,0CAYC;AA0DD;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,qBAAqB,CAAC,IAAgC,EAAE,IAA2B;IAC/F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,eAAe,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,sDAEC"}
package/kms/getKeys.d.ts CHANGED
@@ -55,7 +55,7 @@ export interface GetKeysArgs {
55
55
  */
56
56
  keyNames?: string[];
57
57
  /**
58
- * The algorithm used in the key.
58
+ * The algorithm used in the key. Valid values: SYMMETRIC_256, SYMMETRIC_128, RSA_2048, RSA_3072, RSA_4096, EC_P256K, EC_P256, EC_P384, EC_P521, EC_SM2.
59
59
  */
60
60
  keySpecs?: string[];
61
61
  /**
@@ -63,7 +63,7 @@ export interface GetKeysArgs {
63
63
  */
64
64
  keyStates?: string[];
65
65
  /**
66
- * The usage of the key.
66
+ * The usage of the key. Valid values: ENCRYPT_DECRYPT, SIGN_VERIFY.
67
67
  */
68
68
  keyUsages?: string[];
69
69
  /**
@@ -79,7 +79,7 @@ export interface GetKeysArgs {
79
79
  */
80
80
  nameRegex?: string;
81
81
  /**
82
- * The origin of the key.
82
+ * The origin of the key. Valid values: CloudKMS, External.
83
83
  */
84
84
  origins?: string[];
85
85
  /**
@@ -87,11 +87,11 @@ export interface GetKeysArgs {
87
87
  */
88
88
  outputFile?: string;
89
89
  /**
90
- * The protection level of the key.
90
+ * The protection level of the key. Valid values: SOFTWARE, HSM.
91
91
  */
92
92
  protectionLevels?: string[];
93
93
  /**
94
- * The state of the rotate.
94
+ * The state of the rotate. Valid values: Enable, Disable.
95
95
  */
96
96
  rotateStates?: string[];
97
97
  /**
@@ -213,7 +213,7 @@ export interface GetKeysOutputArgs {
213
213
  */
214
214
  keyNames?: pulumi.Input<pulumi.Input<string>[]>;
215
215
  /**
216
- * The algorithm used in the key.
216
+ * The algorithm used in the key. Valid values: SYMMETRIC_256, SYMMETRIC_128, RSA_2048, RSA_3072, RSA_4096, EC_P256K, EC_P256, EC_P384, EC_P521, EC_SM2.
217
217
  */
218
218
  keySpecs?: pulumi.Input<pulumi.Input<string>[]>;
219
219
  /**
@@ -221,7 +221,7 @@ export interface GetKeysOutputArgs {
221
221
  */
222
222
  keyStates?: pulumi.Input<pulumi.Input<string>[]>;
223
223
  /**
224
- * The usage of the key.
224
+ * The usage of the key. Valid values: ENCRYPT_DECRYPT, SIGN_VERIFY.
225
225
  */
226
226
  keyUsages?: pulumi.Input<pulumi.Input<string>[]>;
227
227
  /**
@@ -237,7 +237,7 @@ export interface GetKeysOutputArgs {
237
237
  */
238
238
  nameRegex?: pulumi.Input<string>;
239
239
  /**
240
- * The origin of the key.
240
+ * The origin of the key. Valid values: CloudKMS, External.
241
241
  */
242
242
  origins?: pulumi.Input<pulumi.Input<string>[]>;
243
243
  /**
@@ -245,11 +245,11 @@ export interface GetKeysOutputArgs {
245
245
  */
246
246
  outputFile?: pulumi.Input<string>;
247
247
  /**
248
- * The protection level of the key.
248
+ * The protection level of the key. Valid values: SOFTWARE, HSM.
249
249
  */
250
250
  protectionLevels?: pulumi.Input<pulumi.Input<string>[]>;
251
251
  /**
252
- * The state of the rotate.
252
+ * The state of the rotate. Valid values: Enable, Disable.
253
253
  */
254
254
  rotateStates?: pulumi.Input<pulumi.Input<string>[]>;
255
255
  /**
@@ -0,0 +1,139 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ import * as outputs from "../types/output";
3
+ /**
4
+ * Use this data source to query detailed information of kms mac verifications
5
+ * ## Example Usage
6
+ *
7
+ * ```typescript
8
+ * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as volcengine from "@pulumi/volcengine";
10
+ *
11
+ * const mac = volcengine.kms.getMacs({
12
+ * keyId: "68093dd1-d1a9-44ce-832a****-5a88c4bc31ab",
13
+ * macAlgorithm: "HMAC_SHA_256",
14
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
15
+ * });
16
+ * const verify = volcengine.kms.getMacVerifications({
17
+ * keyId: "68093dd1-d1a9-44ce-****-5a88c4bc31ab",
18
+ * mac: "Vm0D9fk6uDRZD6k9QZE9+d9gpgy6ESSPt0bfaA2p05w=",
19
+ * macAlgorithm: "HMAC_SHA_256",
20
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
21
+ * });
22
+ * ```
23
+ */
24
+ export declare function getMacVerifications(args: GetMacVerificationsArgs, opts?: pulumi.InvokeOptions): Promise<GetMacVerificationsResult>;
25
+ /**
26
+ * A collection of arguments for invoking getMacVerifications.
27
+ */
28
+ export interface GetMacVerificationsArgs {
29
+ /**
30
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
31
+ */
32
+ keyId?: string;
33
+ /**
34
+ * The name of the key.
35
+ */
36
+ keyName?: string;
37
+ /**
38
+ * The name of the keyring.
39
+ */
40
+ keyringName?: string;
41
+ /**
42
+ * The MAC to verify, Base64 encoded. Verify the Hash-based Message Authentication Code (HMAC), HMAC KMS key, and MAC algorithm for the specified message.
43
+ */
44
+ mac: string;
45
+ /**
46
+ * The MAC algorithm. Valid values: `HMAC_SM3`, `HMAC_SHA_256`.
47
+ */
48
+ macAlgorithm: string;
49
+ /**
50
+ * The message to verify, Base64 encoded.
51
+ */
52
+ message: string;
53
+ /**
54
+ * File name where to save data source results.
55
+ */
56
+ outputFile?: string;
57
+ }
58
+ /**
59
+ * A collection of values returned by getMacVerifications.
60
+ */
61
+ export interface GetMacVerificationsResult {
62
+ /**
63
+ * The provider-assigned unique ID for this managed resource.
64
+ */
65
+ readonly id: string;
66
+ /**
67
+ * The key id.
68
+ */
69
+ readonly keyId?: string;
70
+ readonly keyName?: string;
71
+ readonly keyringName?: string;
72
+ readonly mac: string;
73
+ readonly macAlgorithm: string;
74
+ /**
75
+ * The MAC verification info.
76
+ */
77
+ readonly macVerificationInfos: outputs.kms.GetMacVerificationsMacVerificationInfo[];
78
+ readonly message: string;
79
+ readonly outputFile?: string;
80
+ /**
81
+ * The total count of query.
82
+ */
83
+ readonly totalCount: number;
84
+ }
85
+ /**
86
+ * Use this data source to query detailed information of kms mac verifications
87
+ * ## Example Usage
88
+ *
89
+ * ```typescript
90
+ * import * as pulumi from "@pulumi/pulumi";
91
+ * import * as volcengine from "@pulumi/volcengine";
92
+ *
93
+ * const mac = volcengine.kms.getMacs({
94
+ * keyId: "68093dd1-d1a9-44ce-832a****-5a88c4bc31ab",
95
+ * macAlgorithm: "HMAC_SHA_256",
96
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
97
+ * });
98
+ * const verify = volcengine.kms.getMacVerifications({
99
+ * keyId: "68093dd1-d1a9-44ce-****-5a88c4bc31ab",
100
+ * mac: "Vm0D9fk6uDRZD6k9QZE9+d9gpgy6ESSPt0bfaA2p05w=",
101
+ * macAlgorithm: "HMAC_SHA_256",
102
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
103
+ * });
104
+ * ```
105
+ */
106
+ export declare function getMacVerificationsOutput(args: GetMacVerificationsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetMacVerificationsResult>;
107
+ /**
108
+ * A collection of arguments for invoking getMacVerifications.
109
+ */
110
+ export interface GetMacVerificationsOutputArgs {
111
+ /**
112
+ * The id of the key. When keyId is not specified, both keyringName and keyName must be specified.
113
+ */
114
+ keyId?: pulumi.Input<string>;
115
+ /**
116
+ * The name of the key.
117
+ */
118
+ keyName?: pulumi.Input<string>;
119
+ /**
120
+ * The name of the keyring.
121
+ */
122
+ keyringName?: pulumi.Input<string>;
123
+ /**
124
+ * The MAC to verify, Base64 encoded. Verify the Hash-based Message Authentication Code (HMAC), HMAC KMS key, and MAC algorithm for the specified message.
125
+ */
126
+ mac: pulumi.Input<string>;
127
+ /**
128
+ * The MAC algorithm. Valid values: `HMAC_SM3`, `HMAC_SHA_256`.
129
+ */
130
+ macAlgorithm: pulumi.Input<string>;
131
+ /**
132
+ * The message to verify, Base64 encoded.
133
+ */
134
+ message: pulumi.Input<string>;
135
+ /**
136
+ * File name where to save data source results.
137
+ */
138
+ outputFile?: pulumi.Input<string>;
139
+ }
@@ -0,0 +1,67 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getMacVerificationsOutput = exports.getMacVerifications = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Use this data source to query detailed information of kms mac verifications
10
+ * ## Example Usage
11
+ *
12
+ * ```typescript
13
+ * import * as pulumi from "@pulumi/pulumi";
14
+ * import * as volcengine from "@pulumi/volcengine";
15
+ *
16
+ * const mac = volcengine.kms.getMacs({
17
+ * keyId: "68093dd1-d1a9-44ce-832a****-5a88c4bc31ab",
18
+ * macAlgorithm: "HMAC_SHA_256",
19
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
20
+ * });
21
+ * const verify = volcengine.kms.getMacVerifications({
22
+ * keyId: "68093dd1-d1a9-44ce-****-5a88c4bc31ab",
23
+ * mac: "Vm0D9fk6uDRZD6k9QZE9+d9gpgy6ESSPt0bfaA2p05w=",
24
+ * macAlgorithm: "HMAC_SHA_256",
25
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
26
+ * });
27
+ * ```
28
+ */
29
+ function getMacVerifications(args, opts) {
30
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
31
+ return pulumi.runtime.invoke("volcengine:kms/getMacVerifications:getMacVerifications", {
32
+ "keyId": args.keyId,
33
+ "keyName": args.keyName,
34
+ "keyringName": args.keyringName,
35
+ "mac": args.mac,
36
+ "macAlgorithm": args.macAlgorithm,
37
+ "message": args.message,
38
+ "outputFile": args.outputFile,
39
+ }, opts);
40
+ }
41
+ exports.getMacVerifications = getMacVerifications;
42
+ /**
43
+ * Use this data source to query detailed information of kms mac verifications
44
+ * ## Example Usage
45
+ *
46
+ * ```typescript
47
+ * import * as pulumi from "@pulumi/pulumi";
48
+ * import * as volcengine from "@pulumi/volcengine";
49
+ *
50
+ * const mac = volcengine.kms.getMacs({
51
+ * keyId: "68093dd1-d1a9-44ce-832a****-5a88c4bc31ab",
52
+ * macAlgorithm: "HMAC_SHA_256",
53
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
54
+ * });
55
+ * const verify = volcengine.kms.getMacVerifications({
56
+ * keyId: "68093dd1-d1a9-44ce-****-5a88c4bc31ab",
57
+ * mac: "Vm0D9fk6uDRZD6k9QZE9+d9gpgy6ESSPt0bfaA2p05w=",
58
+ * macAlgorithm: "HMAC_SHA_256",
59
+ * message: "VGhpcyBpcyBhIHRlc3QgTWVzc2FnZS4=",
60
+ * });
61
+ * ```
62
+ */
63
+ function getMacVerificationsOutput(args, opts) {
64
+ return pulumi.output(args).apply((a) => getMacVerifications(a, opts));
65
+ }
66
+ exports.getMacVerificationsOutput = getMacVerificationsOutput;
67
+ //# sourceMappingURL=getMacVerifications.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getMacVerifications.js","sourceRoot":"","sources":["../../kms/getMacVerifications.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAE1F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;KAChC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,kDAYC;AA+DD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC9E,CAAC;AAFD,8DAEC"}