pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -422,6 +422,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
422
422
  """
423
423
  ## Example Usage
424
424
 
425
+ <!--Start PulumiCodeChooser -->
425
426
  ```python
426
427
  import pulumi
427
428
  import pulumi_vault as vault
@@ -450,6 +451,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
450
451
  changetype: delete
451
452
  \"\"\")
452
453
  ```
454
+ <!--End PulumiCodeChooser -->
453
455
 
454
456
  ## Import
455
457
 
@@ -504,6 +506,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
504
506
  """
505
507
  ## Example Usage
506
508
 
509
+ <!--Start PulumiCodeChooser -->
507
510
  ```python
508
511
  import pulumi
509
512
  import pulumi_vault as vault
@@ -532,6 +535,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
532
535
  changetype: delete
533
536
  \"\"\")
534
537
  ```
538
+ <!--End PulumiCodeChooser -->
535
539
 
536
540
  ## Import
537
541
 
@@ -298,6 +298,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
298
298
  """
299
299
  ## Example Usage
300
300
 
301
+ <!--Start PulumiCodeChooser -->
301
302
  ```python
302
303
  import pulumi
303
304
  import pulumi_vault as vault
@@ -311,7 +312,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
311
312
  userdn="CN=Users,DC=corp,DC=example,DC=net")
312
313
  qa = vault.ldap.SecretBackendLibrarySet("qa",
313
314
  mount=config.path,
314
- name="qa",
315
315
  service_account_names=[
316
316
  "Bob",
317
317
  "Mary",
@@ -320,6 +320,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
320
320
  disable_check_in_enforcement=True,
321
321
  max_ttl=120)
322
322
  ```
323
+ <!--End PulumiCodeChooser -->
323
324
 
324
325
  ## Import
325
326
 
@@ -356,6 +357,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
356
357
  """
357
358
  ## Example Usage
358
359
 
360
+ <!--Start PulumiCodeChooser -->
359
361
  ```python
360
362
  import pulumi
361
363
  import pulumi_vault as vault
@@ -369,7 +371,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
369
371
  userdn="CN=Users,DC=corp,DC=example,DC=net")
370
372
  qa = vault.ldap.SecretBackendLibrarySet("qa",
371
373
  mount=config.path,
372
- name="qa",
373
374
  service_account_names=[
374
375
  "Bob",
375
376
  "Mary",
@@ -378,6 +379,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
378
379
  disable_check_in_enforcement=True,
379
380
  max_ttl=120)
380
381
  ```
382
+ <!--End PulumiCodeChooser -->
381
383
 
382
384
  ## Import
383
385
 
@@ -292,6 +292,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
292
292
  """
293
293
  ## Example Usage
294
294
 
295
+ <!--Start PulumiCodeChooser -->
295
296
  ```python
296
297
  import pulumi
297
298
  import pulumi_vault as vault
@@ -310,6 +311,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
310
311
  role_name="alice",
311
312
  rotation_period=60)
312
313
  ```
314
+ <!--End PulumiCodeChooser -->
313
315
 
314
316
  ## Import
315
317
 
@@ -346,6 +348,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
346
348
  """
347
349
  ## Example Usage
348
350
 
351
+ <!--Start PulumiCodeChooser -->
349
352
  ```python
350
353
  import pulumi
351
354
  import pulumi_vault as vault
@@ -364,6 +367,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
364
367
  role_name="alice",
365
368
  rotation_period=60)
366
369
  ```
370
+ <!--End PulumiCodeChooser -->
367
371
 
368
372
  ## Import
369
373
 
@@ -33,19 +33,26 @@ class KeysAwArgs:
33
33
  region: Optional[pulumi.Input[str]] = None,
34
34
  uuid: Optional[pulumi.Input[str]] = None):
35
35
  """
36
- :param pulumi.Input[str] access_key: The AWS access key to use
37
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
38
- :param pulumi.Input[str] key_type: The type of key to use
39
- :param pulumi.Input[str] kms_key: An identifier for the key
40
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
41
- :param pulumi.Input[str] secret_key: The AWS secret key to use
42
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
43
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
44
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
45
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
46
- :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
47
- :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint
48
- :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored)
36
+ :param pulumi.Input[str] access_key: The AWS access key to use.
37
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
38
+ :param pulumi.Input[str] key_type: The type of key to use.
39
+ :param pulumi.Input[str] kms_key: An identifier for the key.
40
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
41
+ :param pulumi.Input[str] secret_key: The AWS access key to use.
42
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
43
+ the referenced backend, instructs Vault to generate a key within the backend.
44
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
45
+ generation or importing a key into the configured backend even
46
+ if a key is present, if set to `false` those operations are forbidden
47
+ if a key exists.
48
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
49
+ configured backend, if `false`, those operations will be forbidden.
50
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
51
+ namespace.
52
+ :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
53
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
54
+ :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
55
+ :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
49
56
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
50
57
  """
51
58
  pulumi.set(__self__, "access_key", access_key)
@@ -75,7 +82,7 @@ class KeysAwArgs:
75
82
  @pulumi.getter(name="accessKey")
76
83
  def access_key(self) -> pulumi.Input[str]:
77
84
  """
78
- The AWS access key to use
85
+ The AWS access key to use.
79
86
  """
80
87
  return pulumi.get(self, "access_key")
81
88
 
@@ -87,7 +94,7 @@ class KeysAwArgs:
87
94
  @pulumi.getter(name="keyBits")
88
95
  def key_bits(self) -> pulumi.Input[str]:
89
96
  """
90
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
97
+ The size in bits for an RSA key.
91
98
  """
92
99
  return pulumi.get(self, "key_bits")
93
100
 
@@ -99,7 +106,7 @@ class KeysAwArgs:
99
106
  @pulumi.getter(name="keyType")
100
107
  def key_type(self) -> pulumi.Input[str]:
101
108
  """
102
- The type of key to use
109
+ The type of key to use.
103
110
  """
104
111
  return pulumi.get(self, "key_type")
105
112
 
@@ -111,7 +118,7 @@ class KeysAwArgs:
111
118
  @pulumi.getter(name="kmsKey")
112
119
  def kms_key(self) -> pulumi.Input[str]:
113
120
  """
114
- An identifier for the key
121
+ An identifier for the key.
115
122
  """
116
123
  return pulumi.get(self, "kms_key")
117
124
 
@@ -123,7 +130,7 @@ class KeysAwArgs:
123
130
  @pulumi.getter
124
131
  def name(self) -> pulumi.Input[str]:
125
132
  """
126
- A unique lowercase name that serves as identifying the key
133
+ A unique lowercase name that serves as identifying the key.
127
134
  """
128
135
  return pulumi.get(self, "name")
129
136
 
@@ -135,7 +142,7 @@ class KeysAwArgs:
135
142
  @pulumi.getter(name="secretKey")
136
143
  def secret_key(self) -> pulumi.Input[str]:
137
144
  """
138
- The AWS secret key to use
145
+ The AWS access key to use.
139
146
  """
140
147
  return pulumi.get(self, "secret_key")
141
148
 
@@ -147,7 +154,8 @@ class KeysAwArgs:
147
154
  @pulumi.getter(name="allowGenerateKey")
148
155
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
149
156
  """
150
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
157
+ If no existing key can be found in
158
+ the referenced backend, instructs Vault to generate a key within the backend.
151
159
  """
152
160
  return pulumi.get(self, "allow_generate_key")
153
161
 
@@ -159,7 +167,10 @@ class KeysAwArgs:
159
167
  @pulumi.getter(name="allowReplaceKey")
160
168
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
161
169
  """
162
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
170
+ Controls the ability for Vault to replace through
171
+ generation or importing a key into the configured backend even
172
+ if a key is present, if set to `false` those operations are forbidden
173
+ if a key exists.
163
174
  """
164
175
  return pulumi.get(self, "allow_replace_key")
165
176
 
@@ -171,7 +182,8 @@ class KeysAwArgs:
171
182
  @pulumi.getter(name="allowStoreKey")
172
183
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
173
184
  """
174
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
185
+ Controls the ability for Vault to import a key to the
186
+ configured backend, if `false`, those operations will be forbidden.
175
187
  """
176
188
  return pulumi.get(self, "allow_store_key")
177
189
 
@@ -183,7 +195,8 @@ class KeysAwArgs:
183
195
  @pulumi.getter(name="anyMount")
184
196
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
185
197
  """
186
- Allow usage from any mount point within the namespace if 'true'
198
+ If `true`, allows usage from any mount point within the
199
+ namespace.
187
200
  """
188
201
  return pulumi.get(self, "any_mount")
189
202
 
@@ -195,7 +208,8 @@ class KeysAwArgs:
195
208
  @pulumi.getter
196
209
  def curve(self) -> Optional[pulumi.Input[str]]:
197
210
  """
198
- The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
211
+ The curve to use for an ECDSA key. Used when `key_type`
212
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
199
213
  """
200
214
  return pulumi.get(self, "curve")
201
215
 
@@ -207,7 +221,7 @@ class KeysAwArgs:
207
221
  @pulumi.getter
208
222
  def endpoint(self) -> Optional[pulumi.Input[str]]:
209
223
  """
210
- Used to specify a custom AWS endpoint
224
+ Used to specify a custom AWS endpoint.
211
225
  """
212
226
  return pulumi.get(self, "endpoint")
213
227
 
@@ -219,7 +233,7 @@ class KeysAwArgs:
219
233
  @pulumi.getter
220
234
  def region(self) -> Optional[pulumi.Input[str]]:
221
235
  """
222
- The AWS region where the keys are stored (or will be stored)
236
+ The AWS region where the keys are stored (or will be stored).
223
237
  """
224
238
  return pulumi.get(self, "region")
225
239
 
@@ -259,20 +273,26 @@ class KeysAzureArgs:
259
273
  resource: Optional[pulumi.Input[str]] = None,
260
274
  uuid: Optional[pulumi.Input[str]] = None):
261
275
  """
262
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
263
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
264
- :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
265
- :param pulumi.Input[str] key_type: The type of key to use
266
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
267
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
268
- :param pulumi.Input[str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
269
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
270
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
271
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
272
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
273
- :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use
274
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
275
- :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to
276
+ :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
277
+ :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs.
278
+ :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption.
279
+ :param pulumi.Input[str] key_type: The type of key to use.
280
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
281
+ :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization.
282
+ :param pulumi.Input[str] vault_name: The Key Vault vault to use for encryption and decryption.
283
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
284
+ the referenced backend, instructs Vault to generate a key within the backend.
285
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
286
+ generation or importing a key into the configured backend even
287
+ if a key is present, if set to `false` those operations are forbidden
288
+ if a key exists.
289
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
290
+ configured backend, if `false`, those operations will be forbidden.
291
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
292
+ namespace.
293
+ :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
294
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
295
+ :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
276
296
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
277
297
  """
278
298
  pulumi.set(__self__, "client_id", client_id)
@@ -303,7 +323,7 @@ class KeysAzureArgs:
303
323
  @pulumi.getter(name="clientId")
304
324
  def client_id(self) -> pulumi.Input[str]:
305
325
  """
306
- The client id for credentials to query the Azure APIs
326
+ The client id for credentials to query the Azure APIs.
307
327
  """
308
328
  return pulumi.get(self, "client_id")
309
329
 
@@ -315,7 +335,7 @@ class KeysAzureArgs:
315
335
  @pulumi.getter(name="clientSecret")
316
336
  def client_secret(self) -> pulumi.Input[str]:
317
337
  """
318
- The client secret for credentials to query the Azure APIs
338
+ The client secret for credentials to query the Azure APIs.
319
339
  """
320
340
  return pulumi.get(self, "client_secret")
321
341
 
@@ -327,7 +347,7 @@ class KeysAzureArgs:
327
347
  @pulumi.getter(name="keyName")
328
348
  def key_name(self) -> pulumi.Input[str]:
329
349
  """
330
- The Key Vault key to use for encryption and decryption
350
+ The Key Vault key to use for encryption and decryption.
331
351
  """
332
352
  return pulumi.get(self, "key_name")
333
353
 
@@ -339,7 +359,7 @@ class KeysAzureArgs:
339
359
  @pulumi.getter(name="keyType")
340
360
  def key_type(self) -> pulumi.Input[str]:
341
361
  """
342
- The type of key to use
362
+ The type of key to use.
343
363
  """
344
364
  return pulumi.get(self, "key_type")
345
365
 
@@ -351,7 +371,7 @@ class KeysAzureArgs:
351
371
  @pulumi.getter
352
372
  def name(self) -> pulumi.Input[str]:
353
373
  """
354
- A unique lowercase name that serves as identifying the key
374
+ A unique lowercase name that serves as identifying the key.
355
375
  """
356
376
  return pulumi.get(self, "name")
357
377
 
@@ -363,7 +383,7 @@ class KeysAzureArgs:
363
383
  @pulumi.getter(name="tenantId")
364
384
  def tenant_id(self) -> pulumi.Input[str]:
365
385
  """
366
- The tenant id for the Azure Active Directory organization
386
+ The tenant id for the Azure Active Directory organization.
367
387
  """
368
388
  return pulumi.get(self, "tenant_id")
369
389
 
@@ -375,7 +395,7 @@ class KeysAzureArgs:
375
395
  @pulumi.getter(name="vaultName")
376
396
  def vault_name(self) -> pulumi.Input[str]:
377
397
  """
378
- The Key Vault vault to use the encryption keys for encryption and decryption
398
+ The Key Vault vault to use for encryption and decryption.
379
399
  """
380
400
  return pulumi.get(self, "vault_name")
381
401
 
@@ -387,7 +407,8 @@ class KeysAzureArgs:
387
407
  @pulumi.getter(name="allowGenerateKey")
388
408
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
389
409
  """
390
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
410
+ If no existing key can be found in
411
+ the referenced backend, instructs Vault to generate a key within the backend.
391
412
  """
392
413
  return pulumi.get(self, "allow_generate_key")
393
414
 
@@ -399,7 +420,10 @@ class KeysAzureArgs:
399
420
  @pulumi.getter(name="allowReplaceKey")
400
421
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
401
422
  """
402
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
423
+ Controls the ability for Vault to replace through
424
+ generation or importing a key into the configured backend even
425
+ if a key is present, if set to `false` those operations are forbidden
426
+ if a key exists.
403
427
  """
404
428
  return pulumi.get(self, "allow_replace_key")
405
429
 
@@ -411,7 +435,8 @@ class KeysAzureArgs:
411
435
  @pulumi.getter(name="allowStoreKey")
412
436
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
413
437
  """
414
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
438
+ Controls the ability for Vault to import a key to the
439
+ configured backend, if `false`, those operations will be forbidden.
415
440
  """
416
441
  return pulumi.get(self, "allow_store_key")
417
442
 
@@ -423,7 +448,8 @@ class KeysAzureArgs:
423
448
  @pulumi.getter(name="anyMount")
424
449
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
425
450
  """
426
- Allow usage from any mount point within the namespace if 'true'
451
+ If `true`, allows usage from any mount point within the
452
+ namespace.
427
453
  """
428
454
  return pulumi.get(self, "any_mount")
429
455
 
@@ -435,7 +461,7 @@ class KeysAzureArgs:
435
461
  @pulumi.getter
436
462
  def environment(self) -> Optional[pulumi.Input[str]]:
437
463
  """
438
- The Azure Cloud environment API endpoints to use
464
+ The Azure Cloud environment API endpoints to use.
439
465
  """
440
466
  return pulumi.get(self, "environment")
441
467
 
@@ -447,7 +473,7 @@ class KeysAzureArgs:
447
473
  @pulumi.getter(name="keyBits")
448
474
  def key_bits(self) -> Optional[pulumi.Input[str]]:
449
475
  """
450
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
476
+ The size in bits for an RSA key.
451
477
  """
452
478
  return pulumi.get(self, "key_bits")
453
479
 
@@ -459,7 +485,7 @@ class KeysAzureArgs:
459
485
  @pulumi.getter
460
486
  def resource(self) -> Optional[pulumi.Input[str]]:
461
487
  """
462
- The Azure Key Vault resource's DNS Suffix to connect to
488
+ The Azure Key Vault resource's DNS Suffix to connect to.
463
489
  """
464
490
  return pulumi.get(self, "resource")
465
491
 
@@ -500,21 +526,32 @@ class KeysPkcArgs:
500
526
  token_label: Optional[pulumi.Input[str]] = None,
501
527
  uuid: Optional[pulumi.Input[str]] = None):
502
528
  """
503
- :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
504
- :param pulumi.Input[str] key_label: The label of the key to use
505
- :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
506
- :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
507
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
508
- :param pulumi.Input[str] pin: The PIN for login
509
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
510
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
511
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
512
- :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
513
- :param pulumi.Input[str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
514
- :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to the HSM
515
- :param pulumi.Input[str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
516
- :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
517
- :param pulumi.Input[str] token_label: The slot token label to use
529
+ :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use.
530
+ :param pulumi.Input[str] key_label: The label of the key to use.
531
+ :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
532
+ to lookup the local library path.
533
+ :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a
534
+ hexadecimal (prefixed by 0x) string.
535
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
536
+ :param pulumi.Input[str] pin: The PIN for login.
537
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
538
+ the referenced backend, instructs Vault to generate a key within the backend.
539
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
540
+ generation or importing a key into the configured backend even
541
+ if a key is present, if set to `false` those operations are forbidden
542
+ if a key exists.
543
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
544
+ configured backend, if `false`, those operations will be forbidden.
545
+ :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
546
+ namespace.
547
+ :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
548
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
549
+ :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to
550
+ the HSM.
551
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
552
+ :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
553
+ (e.g. `2305843009213693953`).
554
+ :param pulumi.Input[str] token_label: The slot token label to use.
518
555
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
519
556
  """
520
557
  pulumi.set(__self__, "key_id", key_id)
@@ -548,7 +585,7 @@ class KeysPkcArgs:
548
585
  @pulumi.getter(name="keyId")
549
586
  def key_id(self) -> pulumi.Input[str]:
550
587
  """
551
- The id of a PKCS#11 key to use
588
+ The id of a PKCS#11 key to use.
552
589
  """
553
590
  return pulumi.get(self, "key_id")
554
591
 
@@ -560,7 +597,7 @@ class KeysPkcArgs:
560
597
  @pulumi.getter(name="keyLabel")
561
598
  def key_label(self) -> pulumi.Input[str]:
562
599
  """
563
- The label of the key to use
600
+ The label of the key to use.
564
601
  """
565
602
  return pulumi.get(self, "key_label")
566
603
 
@@ -572,7 +609,8 @@ class KeysPkcArgs:
572
609
  @pulumi.getter
573
610
  def library(self) -> pulumi.Input[str]:
574
611
  """
575
- The name of the kms_library stanza to use from Vault's config to lookup the local library path
612
+ The name of the kms_library stanza to use from Vault's config
613
+ to lookup the local library path.
576
614
  """
577
615
  return pulumi.get(self, "library")
578
616
 
@@ -584,7 +622,8 @@ class KeysPkcArgs:
584
622
  @pulumi.getter
585
623
  def mechanism(self) -> pulumi.Input[str]:
586
624
  """
587
- The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
625
+ The encryption/decryption mechanism to use, specified as a
626
+ hexadecimal (prefixed by 0x) string.
588
627
  """
589
628
  return pulumi.get(self, "mechanism")
590
629
 
@@ -596,7 +635,7 @@ class KeysPkcArgs:
596
635
  @pulumi.getter
597
636
  def name(self) -> pulumi.Input[str]:
598
637
  """
599
- A unique lowercase name that serves as identifying the key
638
+ A unique lowercase name that serves as identifying the key.
600
639
  """
601
640
  return pulumi.get(self, "name")
602
641
 
@@ -608,7 +647,7 @@ class KeysPkcArgs:
608
647
  @pulumi.getter
609
648
  def pin(self) -> pulumi.Input[str]:
610
649
  """
611
- The PIN for login
650
+ The PIN for login.
612
651
  """
613
652
  return pulumi.get(self, "pin")
614
653
 
@@ -620,7 +659,8 @@ class KeysPkcArgs:
620
659
  @pulumi.getter(name="allowGenerateKey")
621
660
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
622
661
  """
623
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
662
+ If no existing key can be found in
663
+ the referenced backend, instructs Vault to generate a key within the backend.
624
664
  """
625
665
  return pulumi.get(self, "allow_generate_key")
626
666
 
@@ -632,7 +672,10 @@ class KeysPkcArgs:
632
672
  @pulumi.getter(name="allowReplaceKey")
633
673
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
634
674
  """
635
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
675
+ Controls the ability for Vault to replace through
676
+ generation or importing a key into the configured backend even
677
+ if a key is present, if set to `false` those operations are forbidden
678
+ if a key exists.
636
679
  """
637
680
  return pulumi.get(self, "allow_replace_key")
638
681
 
@@ -644,7 +687,8 @@ class KeysPkcArgs:
644
687
  @pulumi.getter(name="allowStoreKey")
645
688
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
646
689
  """
647
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
690
+ Controls the ability for Vault to import a key to the
691
+ configured backend, if `false`, those operations will be forbidden.
648
692
  """
649
693
  return pulumi.get(self, "allow_store_key")
650
694
 
@@ -656,7 +700,8 @@ class KeysPkcArgs:
656
700
  @pulumi.getter(name="anyMount")
657
701
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
658
702
  """
659
- Allow usage from any mount point within the namespace if 'true'
703
+ If `true`, allows usage from any mount point within the
704
+ namespace.
660
705
  """
661
706
  return pulumi.get(self, "any_mount")
662
707
 
@@ -668,7 +713,8 @@ class KeysPkcArgs:
668
713
  @pulumi.getter
669
714
  def curve(self) -> Optional[pulumi.Input[str]]:
670
715
  """
671
- Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
716
+ The curve to use for an ECDSA key. Used when `key_type`
717
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
672
718
  """
673
719
  return pulumi.get(self, "curve")
674
720
 
@@ -680,7 +726,8 @@ class KeysPkcArgs:
680
726
  @pulumi.getter(name="forceRwSession")
681
727
  def force_rw_session(self) -> Optional[pulumi.Input[str]]:
682
728
  """
683
- Force all operations to open up a read-write session to the HSM
729
+ Force all operations to open up a read-write session to
730
+ the HSM.
684
731
  """
685
732
  return pulumi.get(self, "force_rw_session")
686
733
 
@@ -692,7 +739,7 @@ class KeysPkcArgs:
692
739
  @pulumi.getter(name="keyBits")
693
740
  def key_bits(self) -> Optional[pulumi.Input[str]]:
694
741
  """
695
- Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
742
+ The size in bits for an RSA key.
696
743
  """
697
744
  return pulumi.get(self, "key_bits")
698
745
 
@@ -704,7 +751,8 @@ class KeysPkcArgs:
704
751
  @pulumi.getter
705
752
  def slot(self) -> Optional[pulumi.Input[str]]:
706
753
  """
707
- The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
754
+ The slot number to use, specified as a string in a decimal format
755
+ (e.g. `2305843009213693953`).
708
756
  """
709
757
  return pulumi.get(self, "slot")
710
758
 
@@ -716,7 +764,7 @@ class KeysPkcArgs:
716
764
  @pulumi.getter(name="tokenLabel")
717
765
  def token_label(self) -> Optional[pulumi.Input[str]]:
718
766
  """
719
- The slot token label to use
767
+ The slot token label to use.
720
768
  """
721
769
  return pulumi.get(self, "token_label")
722
770