pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -292,6 +292,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
292
292
  """
293
293
  ## Example Usage
294
294
 
295
+ <!--Start PulumiCodeChooser -->
295
296
  ```python
296
297
  import pulumi
297
298
  import pulumi_vault as vault
@@ -310,6 +311,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
310
311
  role_name="alice",
311
312
  rotation_period=60)
312
313
  ```
314
+ <!--End PulumiCodeChooser -->
313
315
 
314
316
  ## Import
315
317
 
@@ -346,6 +348,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
346
348
  """
347
349
  ## Example Usage
348
350
 
351
+ <!--Start PulumiCodeChooser -->
349
352
  ```python
350
353
  import pulumi
351
354
  import pulumi_vault as vault
@@ -364,6 +367,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
364
367
  role_name="alice",
365
368
  rotation_period=60)
366
369
  ```
370
+ <!--End PulumiCodeChooser -->
367
371
 
368
372
  ## Import
369
373
 
@@ -33,19 +33,26 @@ class KeysAwArgs:
33
33
  region: Optional[pulumi.Input[str]] = None,
34
34
  uuid: Optional[pulumi.Input[str]] = None):
35
35
  """
36
- :param pulumi.Input[str] access_key: The AWS access key to use
37
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
38
- :param pulumi.Input[str] key_type: The type of key to use
39
- :param pulumi.Input[str] kms_key: An identifier for the key
40
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
41
- :param pulumi.Input[str] secret_key: The AWS secret key to use
42
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
43
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
44
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
45
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
46
- :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
47
- :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint
48
- :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored)
36
+ :param pulumi.Input[str] access_key: The AWS access key to use.
37
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
38
+ :param pulumi.Input[str] key_type: The type of key to use.
39
+ :param pulumi.Input[str] kms_key: An identifier for the key.
40
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
41
+ :param pulumi.Input[str] secret_key: The AWS access key to use.
42
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
43
+ the referenced backend, instructs Vault to generate a key within the backend.
44
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
45
+ generation or importing a key into the configured backend even
46
+ if a key is present, if set to `false` those operations are forbidden
47
+ if a key exists.
48
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
49
+ configured backend, if `false`, those operations will be forbidden.
50
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
51
+ namespace.
52
+ :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
53
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
54
+ :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
55
+ :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
49
56
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
50
57
  """
51
58
  pulumi.set(__self__, "access_key", access_key)
@@ -75,7 +82,7 @@ class KeysAwArgs:
75
82
  @pulumi.getter(name="accessKey")
76
83
  def access_key(self) -> pulumi.Input[str]:
77
84
  """
78
- The AWS access key to use
85
+ The AWS access key to use.
79
86
  """
80
87
  return pulumi.get(self, "access_key")
81
88
 
@@ -87,7 +94,7 @@ class KeysAwArgs:
87
94
  @pulumi.getter(name="keyBits")
88
95
  def key_bits(self) -> pulumi.Input[str]:
89
96
  """
90
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
97
+ The size in bits for an RSA key.
91
98
  """
92
99
  return pulumi.get(self, "key_bits")
93
100
 
@@ -99,7 +106,7 @@ class KeysAwArgs:
99
106
  @pulumi.getter(name="keyType")
100
107
  def key_type(self) -> pulumi.Input[str]:
101
108
  """
102
- The type of key to use
109
+ The type of key to use.
103
110
  """
104
111
  return pulumi.get(self, "key_type")
105
112
 
@@ -111,7 +118,7 @@ class KeysAwArgs:
111
118
  @pulumi.getter(name="kmsKey")
112
119
  def kms_key(self) -> pulumi.Input[str]:
113
120
  """
114
- An identifier for the key
121
+ An identifier for the key.
115
122
  """
116
123
  return pulumi.get(self, "kms_key")
117
124
 
@@ -123,7 +130,7 @@ class KeysAwArgs:
123
130
  @pulumi.getter
124
131
  def name(self) -> pulumi.Input[str]:
125
132
  """
126
- A unique lowercase name that serves as identifying the key
133
+ A unique lowercase name that serves as identifying the key.
127
134
  """
128
135
  return pulumi.get(self, "name")
129
136
 
@@ -135,7 +142,7 @@ class KeysAwArgs:
135
142
  @pulumi.getter(name="secretKey")
136
143
  def secret_key(self) -> pulumi.Input[str]:
137
144
  """
138
- The AWS secret key to use
145
+ The AWS access key to use.
139
146
  """
140
147
  return pulumi.get(self, "secret_key")
141
148
 
@@ -147,7 +154,8 @@ class KeysAwArgs:
147
154
  @pulumi.getter(name="allowGenerateKey")
148
155
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
149
156
  """
150
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
157
+ If no existing key can be found in
158
+ the referenced backend, instructs Vault to generate a key within the backend.
151
159
  """
152
160
  return pulumi.get(self, "allow_generate_key")
153
161
 
@@ -159,7 +167,10 @@ class KeysAwArgs:
159
167
  @pulumi.getter(name="allowReplaceKey")
160
168
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
161
169
  """
162
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
170
+ Controls the ability for Vault to replace through
171
+ generation or importing a key into the configured backend even
172
+ if a key is present, if set to `false` those operations are forbidden
173
+ if a key exists.
163
174
  """
164
175
  return pulumi.get(self, "allow_replace_key")
165
176
 
@@ -171,7 +182,8 @@ class KeysAwArgs:
171
182
  @pulumi.getter(name="allowStoreKey")
172
183
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
173
184
  """
174
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
185
+ Controls the ability for Vault to import a key to the
186
+ configured backend, if `false`, those operations will be forbidden.
175
187
  """
176
188
  return pulumi.get(self, "allow_store_key")
177
189
 
@@ -183,7 +195,8 @@ class KeysAwArgs:
183
195
  @pulumi.getter(name="anyMount")
184
196
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
185
197
  """
186
- Allow usage from any mount point within the namespace if 'true'
198
+ If `true`, allows usage from any mount point within the
199
+ namespace.
187
200
  """
188
201
  return pulumi.get(self, "any_mount")
189
202
 
@@ -195,7 +208,8 @@ class KeysAwArgs:
195
208
  @pulumi.getter
196
209
  def curve(self) -> Optional[pulumi.Input[str]]:
197
210
  """
198
- The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
211
+ The curve to use for an ECDSA key. Used when `key_type`
212
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
199
213
  """
200
214
  return pulumi.get(self, "curve")
201
215
 
@@ -207,7 +221,7 @@ class KeysAwArgs:
207
221
  @pulumi.getter
208
222
  def endpoint(self) -> Optional[pulumi.Input[str]]:
209
223
  """
210
- Used to specify a custom AWS endpoint
224
+ Used to specify a custom AWS endpoint.
211
225
  """
212
226
  return pulumi.get(self, "endpoint")
213
227
 
@@ -219,7 +233,7 @@ class KeysAwArgs:
219
233
  @pulumi.getter
220
234
  def region(self) -> Optional[pulumi.Input[str]]:
221
235
  """
222
- The AWS region where the keys are stored (or will be stored)
236
+ The AWS region where the keys are stored (or will be stored).
223
237
  """
224
238
  return pulumi.get(self, "region")
225
239
 
@@ -259,20 +273,26 @@ class KeysAzureArgs:
259
273
  resource: Optional[pulumi.Input[str]] = None,
260
274
  uuid: Optional[pulumi.Input[str]] = None):
261
275
  """
262
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
263
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
264
- :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
265
- :param pulumi.Input[str] key_type: The type of key to use
266
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
267
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
268
- :param pulumi.Input[str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
269
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
270
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
271
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
272
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
273
- :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use
274
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
275
- :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to
276
+ :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
277
+ :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs.
278
+ :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption.
279
+ :param pulumi.Input[str] key_type: The type of key to use.
280
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
281
+ :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization.
282
+ :param pulumi.Input[str] vault_name: The Key Vault vault to use for encryption and decryption.
283
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
284
+ the referenced backend, instructs Vault to generate a key within the backend.
285
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
286
+ generation or importing a key into the configured backend even
287
+ if a key is present, if set to `false` those operations are forbidden
288
+ if a key exists.
289
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
290
+ configured backend, if `false`, those operations will be forbidden.
291
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
292
+ namespace.
293
+ :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
294
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
295
+ :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
276
296
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
277
297
  """
278
298
  pulumi.set(__self__, "client_id", client_id)
@@ -303,7 +323,7 @@ class KeysAzureArgs:
303
323
  @pulumi.getter(name="clientId")
304
324
  def client_id(self) -> pulumi.Input[str]:
305
325
  """
306
- The client id for credentials to query the Azure APIs
326
+ The client id for credentials to query the Azure APIs.
307
327
  """
308
328
  return pulumi.get(self, "client_id")
309
329
 
@@ -315,7 +335,7 @@ class KeysAzureArgs:
315
335
  @pulumi.getter(name="clientSecret")
316
336
  def client_secret(self) -> pulumi.Input[str]:
317
337
  """
318
- The client secret for credentials to query the Azure APIs
338
+ The client secret for credentials to query the Azure APIs.
319
339
  """
320
340
  return pulumi.get(self, "client_secret")
321
341
 
@@ -327,7 +347,7 @@ class KeysAzureArgs:
327
347
  @pulumi.getter(name="keyName")
328
348
  def key_name(self) -> pulumi.Input[str]:
329
349
  """
330
- The Key Vault key to use for encryption and decryption
350
+ The Key Vault key to use for encryption and decryption.
331
351
  """
332
352
  return pulumi.get(self, "key_name")
333
353
 
@@ -339,7 +359,7 @@ class KeysAzureArgs:
339
359
  @pulumi.getter(name="keyType")
340
360
  def key_type(self) -> pulumi.Input[str]:
341
361
  """
342
- The type of key to use
362
+ The type of key to use.
343
363
  """
344
364
  return pulumi.get(self, "key_type")
345
365
 
@@ -351,7 +371,7 @@ class KeysAzureArgs:
351
371
  @pulumi.getter
352
372
  def name(self) -> pulumi.Input[str]:
353
373
  """
354
- A unique lowercase name that serves as identifying the key
374
+ A unique lowercase name that serves as identifying the key.
355
375
  """
356
376
  return pulumi.get(self, "name")
357
377
 
@@ -363,7 +383,7 @@ class KeysAzureArgs:
363
383
  @pulumi.getter(name="tenantId")
364
384
  def tenant_id(self) -> pulumi.Input[str]:
365
385
  """
366
- The tenant id for the Azure Active Directory organization
386
+ The tenant id for the Azure Active Directory organization.
367
387
  """
368
388
  return pulumi.get(self, "tenant_id")
369
389
 
@@ -375,7 +395,7 @@ class KeysAzureArgs:
375
395
  @pulumi.getter(name="vaultName")
376
396
  def vault_name(self) -> pulumi.Input[str]:
377
397
  """
378
- The Key Vault vault to use the encryption keys for encryption and decryption
398
+ The Key Vault vault to use for encryption and decryption.
379
399
  """
380
400
  return pulumi.get(self, "vault_name")
381
401
 
@@ -387,7 +407,8 @@ class KeysAzureArgs:
387
407
  @pulumi.getter(name="allowGenerateKey")
388
408
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
389
409
  """
390
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
410
+ If no existing key can be found in
411
+ the referenced backend, instructs Vault to generate a key within the backend.
391
412
  """
392
413
  return pulumi.get(self, "allow_generate_key")
393
414
 
@@ -399,7 +420,10 @@ class KeysAzureArgs:
399
420
  @pulumi.getter(name="allowReplaceKey")
400
421
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
401
422
  """
402
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
423
+ Controls the ability for Vault to replace through
424
+ generation or importing a key into the configured backend even
425
+ if a key is present, if set to `false` those operations are forbidden
426
+ if a key exists.
403
427
  """
404
428
  return pulumi.get(self, "allow_replace_key")
405
429
 
@@ -411,7 +435,8 @@ class KeysAzureArgs:
411
435
  @pulumi.getter(name="allowStoreKey")
412
436
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
413
437
  """
414
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
438
+ Controls the ability for Vault to import a key to the
439
+ configured backend, if `false`, those operations will be forbidden.
415
440
  """
416
441
  return pulumi.get(self, "allow_store_key")
417
442
 
@@ -423,7 +448,8 @@ class KeysAzureArgs:
423
448
  @pulumi.getter(name="anyMount")
424
449
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
425
450
  """
426
- Allow usage from any mount point within the namespace if 'true'
451
+ If `true`, allows usage from any mount point within the
452
+ namespace.
427
453
  """
428
454
  return pulumi.get(self, "any_mount")
429
455
 
@@ -435,7 +461,7 @@ class KeysAzureArgs:
435
461
  @pulumi.getter
436
462
  def environment(self) -> Optional[pulumi.Input[str]]:
437
463
  """
438
- The Azure Cloud environment API endpoints to use
464
+ The Azure Cloud environment API endpoints to use.
439
465
  """
440
466
  return pulumi.get(self, "environment")
441
467
 
@@ -447,7 +473,7 @@ class KeysAzureArgs:
447
473
  @pulumi.getter(name="keyBits")
448
474
  def key_bits(self) -> Optional[pulumi.Input[str]]:
449
475
  """
450
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
476
+ The size in bits for an RSA key.
451
477
  """
452
478
  return pulumi.get(self, "key_bits")
453
479
 
@@ -459,7 +485,7 @@ class KeysAzureArgs:
459
485
  @pulumi.getter
460
486
  def resource(self) -> Optional[pulumi.Input[str]]:
461
487
  """
462
- The Azure Key Vault resource's DNS Suffix to connect to
488
+ The Azure Key Vault resource's DNS Suffix to connect to.
463
489
  """
464
490
  return pulumi.get(self, "resource")
465
491
 
@@ -500,21 +526,32 @@ class KeysPkcArgs:
500
526
  token_label: Optional[pulumi.Input[str]] = None,
501
527
  uuid: Optional[pulumi.Input[str]] = None):
502
528
  """
503
- :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
504
- :param pulumi.Input[str] key_label: The label of the key to use
505
- :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
506
- :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
507
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
508
- :param pulumi.Input[str] pin: The PIN for login
509
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
510
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
511
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
512
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
513
- :param pulumi.Input[str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
514
- :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to the HSM
515
- :param pulumi.Input[str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
516
- :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
517
- :param pulumi.Input[str] token_label: The slot token label to use
529
+ :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use.
530
+ :param pulumi.Input[str] key_label: The label of the key to use.
531
+ :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
532
+ to lookup the local library path.
533
+ :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a
534
+ hexadecimal (prefixed by 0x) string.
535
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
536
+ :param pulumi.Input[str] pin: The PIN for login.
537
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
538
+ the referenced backend, instructs Vault to generate a key within the backend.
539
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
540
+ generation or importing a key into the configured backend even
541
+ if a key is present, if set to `false` those operations are forbidden
542
+ if a key exists.
543
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
544
+ configured backend, if `false`, those operations will be forbidden.
545
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
546
+ namespace.
547
+ :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
548
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
549
+ :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to
550
+ the HSM.
551
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
552
+ :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
553
+ (e.g. `2305843009213693953`).
554
+ :param pulumi.Input[str] token_label: The slot token label to use.
518
555
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
519
556
  """
520
557
  pulumi.set(__self__, "key_id", key_id)
@@ -548,7 +585,7 @@ class KeysPkcArgs:
548
585
  @pulumi.getter(name="keyId")
549
586
  def key_id(self) -> pulumi.Input[str]:
550
587
  """
551
- The id of a PKCS#11 key to use
588
+ The id of a PKCS#11 key to use.
552
589
  """
553
590
  return pulumi.get(self, "key_id")
554
591
 
@@ -560,7 +597,7 @@ class KeysPkcArgs:
560
597
  @pulumi.getter(name="keyLabel")
561
598
  def key_label(self) -> pulumi.Input[str]:
562
599
  """
563
- The label of the key to use
600
+ The label of the key to use.
564
601
  """
565
602
  return pulumi.get(self, "key_label")
566
603
 
@@ -572,7 +609,8 @@ class KeysPkcArgs:
572
609
  @pulumi.getter
573
610
  def library(self) -> pulumi.Input[str]:
574
611
  """
575
- The name of the kms_library stanza to use from Vault's config to lookup the local library path
612
+ The name of the kms_library stanza to use from Vault's config
613
+ to lookup the local library path.
576
614
  """
577
615
  return pulumi.get(self, "library")
578
616
 
@@ -584,7 +622,8 @@ class KeysPkcArgs:
584
622
  @pulumi.getter
585
623
  def mechanism(self) -> pulumi.Input[str]:
586
624
  """
587
- The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
625
+ The encryption/decryption mechanism to use, specified as a
626
+ hexadecimal (prefixed by 0x) string.
588
627
  """
589
628
  return pulumi.get(self, "mechanism")
590
629
 
@@ -596,7 +635,7 @@ class KeysPkcArgs:
596
635
  @pulumi.getter
597
636
  def name(self) -> pulumi.Input[str]:
598
637
  """
599
- A unique lowercase name that serves as identifying the key
638
+ A unique lowercase name that serves as identifying the key.
600
639
  """
601
640
  return pulumi.get(self, "name")
602
641
 
@@ -608,7 +647,7 @@ class KeysPkcArgs:
608
647
  @pulumi.getter
609
648
  def pin(self) -> pulumi.Input[str]:
610
649
  """
611
- The PIN for login
650
+ The PIN for login.
612
651
  """
613
652
  return pulumi.get(self, "pin")
614
653
 
@@ -620,7 +659,8 @@ class KeysPkcArgs:
620
659
  @pulumi.getter(name="allowGenerateKey")
621
660
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
622
661
  """
623
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
662
+ If no existing key can be found in
663
+ the referenced backend, instructs Vault to generate a key within the backend.
624
664
  """
625
665
  return pulumi.get(self, "allow_generate_key")
626
666
 
@@ -632,7 +672,10 @@ class KeysPkcArgs:
632
672
  @pulumi.getter(name="allowReplaceKey")
633
673
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
634
674
  """
635
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
675
+ Controls the ability for Vault to replace through
676
+ generation or importing a key into the configured backend even
677
+ if a key is present, if set to `false` those operations are forbidden
678
+ if a key exists.
636
679
  """
637
680
  return pulumi.get(self, "allow_replace_key")
638
681
 
@@ -644,7 +687,8 @@ class KeysPkcArgs:
644
687
  @pulumi.getter(name="allowStoreKey")
645
688
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
646
689
  """
647
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
690
+ Controls the ability for Vault to import a key to the
691
+ configured backend, if `false`, those operations will be forbidden.
648
692
  """
649
693
  return pulumi.get(self, "allow_store_key")
650
694
 
@@ -656,7 +700,8 @@ class KeysPkcArgs:
656
700
  @pulumi.getter(name="anyMount")
657
701
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
658
702
  """
659
- Allow usage from any mount point within the namespace if 'true'
703
+ If `true`, allows usage from any mount point within the
704
+ namespace.
660
705
  """
661
706
  return pulumi.get(self, "any_mount")
662
707
 
@@ -668,7 +713,8 @@ class KeysPkcArgs:
668
713
  @pulumi.getter
669
714
  def curve(self) -> Optional[pulumi.Input[str]]:
670
715
  """
671
- Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
716
+ The curve to use for an ECDSA key. Used when `key_type`
717
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
672
718
  """
673
719
  return pulumi.get(self, "curve")
674
720
 
@@ -680,7 +726,8 @@ class KeysPkcArgs:
680
726
  @pulumi.getter(name="forceRwSession")
681
727
  def force_rw_session(self) -> Optional[pulumi.Input[str]]:
682
728
  """
683
- Force all operations to open up a read-write session to the HSM
729
+ Force all operations to open up a read-write session to
730
+ the HSM.
684
731
  """
685
732
  return pulumi.get(self, "force_rw_session")
686
733
 
@@ -692,7 +739,7 @@ class KeysPkcArgs:
692
739
  @pulumi.getter(name="keyBits")
693
740
  def key_bits(self) -> Optional[pulumi.Input[str]]:
694
741
  """
695
- Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
742
+ The size in bits for an RSA key.
696
743
  """
697
744
  return pulumi.get(self, "key_bits")
698
745
 
@@ -704,7 +751,8 @@ class KeysPkcArgs:
704
751
  @pulumi.getter
705
752
  def slot(self) -> Optional[pulumi.Input[str]]:
706
753
  """
707
- The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
754
+ The slot number to use, specified as a string in a decimal format
755
+ (e.g. `2305843009213693953`).
708
756
  """
709
757
  return pulumi.get(self, "slot")
710
758
 
@@ -716,7 +764,7 @@ class KeysPkcArgs:
716
764
  @pulumi.getter(name="tokenLabel")
717
765
  def token_label(self) -> Optional[pulumi.Input[str]]:
718
766
  """
719
- The slot token label to use
767
+ The slot token label to use.
720
768
  """
721
769
  return pulumi.get(self, "token_label")
722
770
 
@@ -24,7 +24,10 @@ class KeysArgs:
24
24
  The set of arguments for constructing a Keys resource.
25
25
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
26
26
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
27
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
27
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
+ The value should not contain leading or trailing forward slashes.
29
+ The `namespace` is always relative to the provider's configured namespace.
30
+ *Available only for Vault Enterprise*.
28
31
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
29
32
  """
30
33
  if aws is not None:
@@ -64,7 +67,10 @@ class KeysArgs:
64
67
  @pulumi.getter
65
68
  def namespace(self) -> Optional[pulumi.Input[str]]:
66
69
  """
67
- Target namespace. (requires Enterprise)
70
+ The namespace to provision the resource in.
71
+ The value should not contain leading or trailing forward slashes.
72
+ The `namespace` is always relative to the provider's configured namespace.
73
+ *Available only for Vault Enterprise*.
68
74
  """
69
75
  return pulumi.get(self, "namespace")
70
76
 
@@ -96,7 +102,10 @@ class _KeysState:
96
102
  Input properties used for looking up and filtering Keys resources.
97
103
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
98
104
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
99
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
105
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
106
+ The value should not contain leading or trailing forward slashes.
107
+ The `namespace` is always relative to the provider's configured namespace.
108
+ *Available only for Vault Enterprise*.
100
109
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
101
110
  """
102
111
  if aws is not None:
@@ -136,7 +145,10 @@ class _KeysState:
136
145
  @pulumi.getter
137
146
  def namespace(self) -> Optional[pulumi.Input[str]]:
138
147
  """
139
- Target namespace. (requires Enterprise)
148
+ The namespace to provision the resource in.
149
+ The value should not contain leading or trailing forward slashes.
150
+ The `namespace` is always relative to the provider's configured namespace.
151
+ *Available only for Vault Enterprise*.
140
152
  """
141
153
  return pulumi.get(self, "namespace")
142
154
 
@@ -184,7 +196,10 @@ class Keys(pulumi.CustomResource):
184
196
  :param pulumi.ResourceOptions opts: Options for the resource.
185
197
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
186
198
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
187
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
199
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
200
+ The value should not contain leading or trailing forward slashes.
201
+ The `namespace` is always relative to the provider's configured namespace.
202
+ *Available only for Vault Enterprise*.
188
203
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
189
204
  """
190
205
  ...
@@ -261,7 +276,10 @@ class Keys(pulumi.CustomResource):
261
276
  :param pulumi.ResourceOptions opts: Options for the resource.
262
277
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
263
278
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
264
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
279
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
280
+ The value should not contain leading or trailing forward slashes.
281
+ The `namespace` is always relative to the provider's configured namespace.
282
+ *Available only for Vault Enterprise*.
265
283
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
266
284
  """
267
285
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -294,7 +312,10 @@ class Keys(pulumi.CustomResource):
294
312
  @pulumi.getter
295
313
  def namespace(self) -> pulumi.Output[Optional[str]]:
296
314
  """
297
- Target namespace. (requires Enterprise)
315
+ The namespace to provision the resource in.
316
+ The value should not contain leading or trailing forward slashes.
317
+ The `namespace` is always relative to the provider's configured namespace.
318
+ *Available only for Vault Enterprise*.
298
319
  """
299
320
  return pulumi.get(self, "namespace")
300
321