pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -422,6 +422,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
422
422
|
"""
|
423
423
|
## Example Usage
|
424
424
|
|
425
|
+
<!--Start PulumiCodeChooser -->
|
425
426
|
```python
|
426
427
|
import pulumi
|
427
428
|
import pulumi_vault as vault
|
@@ -450,6 +451,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
450
451
|
changetype: delete
|
451
452
|
\"\"\")
|
452
453
|
```
|
454
|
+
<!--End PulumiCodeChooser -->
|
453
455
|
|
454
456
|
## Import
|
455
457
|
|
@@ -504,6 +506,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
504
506
|
"""
|
505
507
|
## Example Usage
|
506
508
|
|
509
|
+
<!--Start PulumiCodeChooser -->
|
507
510
|
```python
|
508
511
|
import pulumi
|
509
512
|
import pulumi_vault as vault
|
@@ -532,6 +535,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
532
535
|
changetype: delete
|
533
536
|
\"\"\")
|
534
537
|
```
|
538
|
+
<!--End PulumiCodeChooser -->
|
535
539
|
|
536
540
|
## Import
|
537
541
|
|
@@ -298,6 +298,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
298
298
|
"""
|
299
299
|
## Example Usage
|
300
300
|
|
301
|
+
<!--Start PulumiCodeChooser -->
|
301
302
|
```python
|
302
303
|
import pulumi
|
303
304
|
import pulumi_vault as vault
|
@@ -311,7 +312,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
311
312
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
312
313
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
313
314
|
mount=config.path,
|
314
|
-
name="qa",
|
315
315
|
service_account_names=[
|
316
316
|
"Bob",
|
317
317
|
"Mary",
|
@@ -320,6 +320,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
320
320
|
disable_check_in_enforcement=True,
|
321
321
|
max_ttl=120)
|
322
322
|
```
|
323
|
+
<!--End PulumiCodeChooser -->
|
323
324
|
|
324
325
|
## Import
|
325
326
|
|
@@ -356,6 +357,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
356
357
|
"""
|
357
358
|
## Example Usage
|
358
359
|
|
360
|
+
<!--Start PulumiCodeChooser -->
|
359
361
|
```python
|
360
362
|
import pulumi
|
361
363
|
import pulumi_vault as vault
|
@@ -369,7 +371,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
369
371
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
370
372
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
371
373
|
mount=config.path,
|
372
|
-
name="qa",
|
373
374
|
service_account_names=[
|
374
375
|
"Bob",
|
375
376
|
"Mary",
|
@@ -378,6 +379,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
378
379
|
disable_check_in_enforcement=True,
|
379
380
|
max_ttl=120)
|
380
381
|
```
|
382
|
+
<!--End PulumiCodeChooser -->
|
381
383
|
|
382
384
|
## Import
|
383
385
|
|
@@ -292,6 +292,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
292
292
|
"""
|
293
293
|
## Example Usage
|
294
294
|
|
295
|
+
<!--Start PulumiCodeChooser -->
|
295
296
|
```python
|
296
297
|
import pulumi
|
297
298
|
import pulumi_vault as vault
|
@@ -310,6 +311,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
310
311
|
role_name="alice",
|
311
312
|
rotation_period=60)
|
312
313
|
```
|
314
|
+
<!--End PulumiCodeChooser -->
|
313
315
|
|
314
316
|
## Import
|
315
317
|
|
@@ -346,6 +348,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
346
348
|
"""
|
347
349
|
## Example Usage
|
348
350
|
|
351
|
+
<!--Start PulumiCodeChooser -->
|
349
352
|
```python
|
350
353
|
import pulumi
|
351
354
|
import pulumi_vault as vault
|
@@ -364,6 +367,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
364
367
|
role_name="alice",
|
365
368
|
rotation_period=60)
|
366
369
|
```
|
370
|
+
<!--End PulumiCodeChooser -->
|
367
371
|
|
368
372
|
## Import
|
369
373
|
|
pulumi_vault/managed/_inputs.py
CHANGED
@@ -33,19 +33,26 @@ class KeysAwArgs:
|
|
33
33
|
region: Optional[pulumi.Input[str]] = None,
|
34
34
|
uuid: Optional[pulumi.Input[str]] = None):
|
35
35
|
"""
|
36
|
-
:param pulumi.Input[str] access_key: The AWS access key to use
|
37
|
-
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
38
|
-
:param pulumi.Input[str] key_type: The type of key to use
|
39
|
-
:param pulumi.Input[str] kms_key: An identifier for the key
|
40
|
-
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
41
|
-
:param pulumi.Input[str] secret_key: The AWS
|
42
|
-
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
43
|
-
|
44
|
-
:param pulumi.Input[bool]
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[str] access_key: The AWS access key to use.
|
37
|
+
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
38
|
+
:param pulumi.Input[str] key_type: The type of key to use.
|
39
|
+
:param pulumi.Input[str] kms_key: An identifier for the key.
|
40
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
|
41
|
+
:param pulumi.Input[str] secret_key: The AWS access key to use.
|
42
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
43
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
44
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
|
45
|
+
generation or importing a key into the configured backend even
|
46
|
+
if a key is present, if set to `false` those operations are forbidden
|
47
|
+
if a key exists.
|
48
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
|
49
|
+
configured backend, if `false`, those operations will be forbidden.
|
50
|
+
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
51
|
+
namespace.
|
52
|
+
:param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
|
53
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
54
|
+
:param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
|
55
|
+
:param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
|
49
56
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
50
57
|
"""
|
51
58
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -75,7 +82,7 @@ class KeysAwArgs:
|
|
75
82
|
@pulumi.getter(name="accessKey")
|
76
83
|
def access_key(self) -> pulumi.Input[str]:
|
77
84
|
"""
|
78
|
-
The AWS access key to use
|
85
|
+
The AWS access key to use.
|
79
86
|
"""
|
80
87
|
return pulumi.get(self, "access_key")
|
81
88
|
|
@@ -87,7 +94,7 @@ class KeysAwArgs:
|
|
87
94
|
@pulumi.getter(name="keyBits")
|
88
95
|
def key_bits(self) -> pulumi.Input[str]:
|
89
96
|
"""
|
90
|
-
The size in bits for an RSA key.
|
97
|
+
The size in bits for an RSA key.
|
91
98
|
"""
|
92
99
|
return pulumi.get(self, "key_bits")
|
93
100
|
|
@@ -99,7 +106,7 @@ class KeysAwArgs:
|
|
99
106
|
@pulumi.getter(name="keyType")
|
100
107
|
def key_type(self) -> pulumi.Input[str]:
|
101
108
|
"""
|
102
|
-
The type of key to use
|
109
|
+
The type of key to use.
|
103
110
|
"""
|
104
111
|
return pulumi.get(self, "key_type")
|
105
112
|
|
@@ -111,7 +118,7 @@ class KeysAwArgs:
|
|
111
118
|
@pulumi.getter(name="kmsKey")
|
112
119
|
def kms_key(self) -> pulumi.Input[str]:
|
113
120
|
"""
|
114
|
-
An identifier for the key
|
121
|
+
An identifier for the key.
|
115
122
|
"""
|
116
123
|
return pulumi.get(self, "kms_key")
|
117
124
|
|
@@ -123,7 +130,7 @@ class KeysAwArgs:
|
|
123
130
|
@pulumi.getter
|
124
131
|
def name(self) -> pulumi.Input[str]:
|
125
132
|
"""
|
126
|
-
A unique lowercase name that serves as identifying the key
|
133
|
+
A unique lowercase name that serves as identifying the key.
|
127
134
|
"""
|
128
135
|
return pulumi.get(self, "name")
|
129
136
|
|
@@ -135,7 +142,7 @@ class KeysAwArgs:
|
|
135
142
|
@pulumi.getter(name="secretKey")
|
136
143
|
def secret_key(self) -> pulumi.Input[str]:
|
137
144
|
"""
|
138
|
-
The AWS
|
145
|
+
The AWS access key to use.
|
139
146
|
"""
|
140
147
|
return pulumi.get(self, "secret_key")
|
141
148
|
|
@@ -147,7 +154,8 @@ class KeysAwArgs:
|
|
147
154
|
@pulumi.getter(name="allowGenerateKey")
|
148
155
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
149
156
|
"""
|
150
|
-
If no existing key can be found in
|
157
|
+
If no existing key can be found in
|
158
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
151
159
|
"""
|
152
160
|
return pulumi.get(self, "allow_generate_key")
|
153
161
|
|
@@ -159,7 +167,10 @@ class KeysAwArgs:
|
|
159
167
|
@pulumi.getter(name="allowReplaceKey")
|
160
168
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
161
169
|
"""
|
162
|
-
Controls the ability for Vault to replace through
|
170
|
+
Controls the ability for Vault to replace through
|
171
|
+
generation or importing a key into the configured backend even
|
172
|
+
if a key is present, if set to `false` those operations are forbidden
|
173
|
+
if a key exists.
|
163
174
|
"""
|
164
175
|
return pulumi.get(self, "allow_replace_key")
|
165
176
|
|
@@ -171,7 +182,8 @@ class KeysAwArgs:
|
|
171
182
|
@pulumi.getter(name="allowStoreKey")
|
172
183
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
173
184
|
"""
|
174
|
-
Controls the ability for Vault to import a key to the
|
185
|
+
Controls the ability for Vault to import a key to the
|
186
|
+
configured backend, if `false`, those operations will be forbidden.
|
175
187
|
"""
|
176
188
|
return pulumi.get(self, "allow_store_key")
|
177
189
|
|
@@ -183,7 +195,8 @@ class KeysAwArgs:
|
|
183
195
|
@pulumi.getter(name="anyMount")
|
184
196
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
185
197
|
"""
|
186
|
-
|
198
|
+
If `true`, allows usage from any mount point within the
|
199
|
+
namespace.
|
187
200
|
"""
|
188
201
|
return pulumi.get(self, "any_mount")
|
189
202
|
|
@@ -195,7 +208,8 @@ class KeysAwArgs:
|
|
195
208
|
@pulumi.getter
|
196
209
|
def curve(self) -> Optional[pulumi.Input[str]]:
|
197
210
|
"""
|
198
|
-
The curve to use for an ECDSA key. Used when key_type
|
211
|
+
The curve to use for an ECDSA key. Used when `key_type`
|
212
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
199
213
|
"""
|
200
214
|
return pulumi.get(self, "curve")
|
201
215
|
|
@@ -207,7 +221,7 @@ class KeysAwArgs:
|
|
207
221
|
@pulumi.getter
|
208
222
|
def endpoint(self) -> Optional[pulumi.Input[str]]:
|
209
223
|
"""
|
210
|
-
Used to specify a custom AWS endpoint
|
224
|
+
Used to specify a custom AWS endpoint.
|
211
225
|
"""
|
212
226
|
return pulumi.get(self, "endpoint")
|
213
227
|
|
@@ -219,7 +233,7 @@ class KeysAwArgs:
|
|
219
233
|
@pulumi.getter
|
220
234
|
def region(self) -> Optional[pulumi.Input[str]]:
|
221
235
|
"""
|
222
|
-
The AWS region where the keys are stored (or will be stored)
|
236
|
+
The AWS region where the keys are stored (or will be stored).
|
223
237
|
"""
|
224
238
|
return pulumi.get(self, "region")
|
225
239
|
|
@@ -259,20 +273,26 @@ class KeysAzureArgs:
|
|
259
273
|
resource: Optional[pulumi.Input[str]] = None,
|
260
274
|
uuid: Optional[pulumi.Input[str]] = None):
|
261
275
|
"""
|
262
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
|
263
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
|
264
|
-
:param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
|
265
|
-
:param pulumi.Input[str] key_type: The type of key to use
|
266
|
-
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
267
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
|
268
|
-
:param pulumi.Input[str] vault_name: The Key Vault vault to use
|
269
|
-
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
270
|
-
|
271
|
-
:param pulumi.Input[bool]
|
272
|
-
|
273
|
-
|
274
|
-
|
275
|
-
:param pulumi.Input[
|
276
|
+
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
|
277
|
+
:param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs.
|
278
|
+
:param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption.
|
279
|
+
:param pulumi.Input[str] key_type: The type of key to use.
|
280
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
|
281
|
+
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization.
|
282
|
+
:param pulumi.Input[str] vault_name: The Key Vault vault to use for encryption and decryption.
|
283
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
284
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
285
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
|
286
|
+
generation or importing a key into the configured backend even
|
287
|
+
if a key is present, if set to `false` those operations are forbidden
|
288
|
+
if a key exists.
|
289
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
|
290
|
+
configured backend, if `false`, those operations will be forbidden.
|
291
|
+
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
292
|
+
namespace.
|
293
|
+
:param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
|
294
|
+
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
295
|
+
:param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
276
296
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
277
297
|
"""
|
278
298
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -303,7 +323,7 @@ class KeysAzureArgs:
|
|
303
323
|
@pulumi.getter(name="clientId")
|
304
324
|
def client_id(self) -> pulumi.Input[str]:
|
305
325
|
"""
|
306
|
-
The client id for credentials to query the Azure APIs
|
326
|
+
The client id for credentials to query the Azure APIs.
|
307
327
|
"""
|
308
328
|
return pulumi.get(self, "client_id")
|
309
329
|
|
@@ -315,7 +335,7 @@ class KeysAzureArgs:
|
|
315
335
|
@pulumi.getter(name="clientSecret")
|
316
336
|
def client_secret(self) -> pulumi.Input[str]:
|
317
337
|
"""
|
318
|
-
The client secret for credentials to query the Azure APIs
|
338
|
+
The client secret for credentials to query the Azure APIs.
|
319
339
|
"""
|
320
340
|
return pulumi.get(self, "client_secret")
|
321
341
|
|
@@ -327,7 +347,7 @@ class KeysAzureArgs:
|
|
327
347
|
@pulumi.getter(name="keyName")
|
328
348
|
def key_name(self) -> pulumi.Input[str]:
|
329
349
|
"""
|
330
|
-
The Key Vault key to use for encryption and decryption
|
350
|
+
The Key Vault key to use for encryption and decryption.
|
331
351
|
"""
|
332
352
|
return pulumi.get(self, "key_name")
|
333
353
|
|
@@ -339,7 +359,7 @@ class KeysAzureArgs:
|
|
339
359
|
@pulumi.getter(name="keyType")
|
340
360
|
def key_type(self) -> pulumi.Input[str]:
|
341
361
|
"""
|
342
|
-
The type of key to use
|
362
|
+
The type of key to use.
|
343
363
|
"""
|
344
364
|
return pulumi.get(self, "key_type")
|
345
365
|
|
@@ -351,7 +371,7 @@ class KeysAzureArgs:
|
|
351
371
|
@pulumi.getter
|
352
372
|
def name(self) -> pulumi.Input[str]:
|
353
373
|
"""
|
354
|
-
A unique lowercase name that serves as identifying the key
|
374
|
+
A unique lowercase name that serves as identifying the key.
|
355
375
|
"""
|
356
376
|
return pulumi.get(self, "name")
|
357
377
|
|
@@ -363,7 +383,7 @@ class KeysAzureArgs:
|
|
363
383
|
@pulumi.getter(name="tenantId")
|
364
384
|
def tenant_id(self) -> pulumi.Input[str]:
|
365
385
|
"""
|
366
|
-
The tenant id for the Azure Active Directory organization
|
386
|
+
The tenant id for the Azure Active Directory organization.
|
367
387
|
"""
|
368
388
|
return pulumi.get(self, "tenant_id")
|
369
389
|
|
@@ -375,7 +395,7 @@ class KeysAzureArgs:
|
|
375
395
|
@pulumi.getter(name="vaultName")
|
376
396
|
def vault_name(self) -> pulumi.Input[str]:
|
377
397
|
"""
|
378
|
-
The Key Vault vault to use
|
398
|
+
The Key Vault vault to use for encryption and decryption.
|
379
399
|
"""
|
380
400
|
return pulumi.get(self, "vault_name")
|
381
401
|
|
@@ -387,7 +407,8 @@ class KeysAzureArgs:
|
|
387
407
|
@pulumi.getter(name="allowGenerateKey")
|
388
408
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
389
409
|
"""
|
390
|
-
If no existing key can be found in
|
410
|
+
If no existing key can be found in
|
411
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
391
412
|
"""
|
392
413
|
return pulumi.get(self, "allow_generate_key")
|
393
414
|
|
@@ -399,7 +420,10 @@ class KeysAzureArgs:
|
|
399
420
|
@pulumi.getter(name="allowReplaceKey")
|
400
421
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
401
422
|
"""
|
402
|
-
Controls the ability for Vault to replace through
|
423
|
+
Controls the ability for Vault to replace through
|
424
|
+
generation or importing a key into the configured backend even
|
425
|
+
if a key is present, if set to `false` those operations are forbidden
|
426
|
+
if a key exists.
|
403
427
|
"""
|
404
428
|
return pulumi.get(self, "allow_replace_key")
|
405
429
|
|
@@ -411,7 +435,8 @@ class KeysAzureArgs:
|
|
411
435
|
@pulumi.getter(name="allowStoreKey")
|
412
436
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
413
437
|
"""
|
414
|
-
Controls the ability for Vault to import a key to the
|
438
|
+
Controls the ability for Vault to import a key to the
|
439
|
+
configured backend, if `false`, those operations will be forbidden.
|
415
440
|
"""
|
416
441
|
return pulumi.get(self, "allow_store_key")
|
417
442
|
|
@@ -423,7 +448,8 @@ class KeysAzureArgs:
|
|
423
448
|
@pulumi.getter(name="anyMount")
|
424
449
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
425
450
|
"""
|
426
|
-
|
451
|
+
If `true`, allows usage from any mount point within the
|
452
|
+
namespace.
|
427
453
|
"""
|
428
454
|
return pulumi.get(self, "any_mount")
|
429
455
|
|
@@ -435,7 +461,7 @@ class KeysAzureArgs:
|
|
435
461
|
@pulumi.getter
|
436
462
|
def environment(self) -> Optional[pulumi.Input[str]]:
|
437
463
|
"""
|
438
|
-
The Azure Cloud environment API endpoints to use
|
464
|
+
The Azure Cloud environment API endpoints to use.
|
439
465
|
"""
|
440
466
|
return pulumi.get(self, "environment")
|
441
467
|
|
@@ -447,7 +473,7 @@ class KeysAzureArgs:
|
|
447
473
|
@pulumi.getter(name="keyBits")
|
448
474
|
def key_bits(self) -> Optional[pulumi.Input[str]]:
|
449
475
|
"""
|
450
|
-
The size in bits for an RSA key.
|
476
|
+
The size in bits for an RSA key.
|
451
477
|
"""
|
452
478
|
return pulumi.get(self, "key_bits")
|
453
479
|
|
@@ -459,7 +485,7 @@ class KeysAzureArgs:
|
|
459
485
|
@pulumi.getter
|
460
486
|
def resource(self) -> Optional[pulumi.Input[str]]:
|
461
487
|
"""
|
462
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
488
|
+
The Azure Key Vault resource's DNS Suffix to connect to.
|
463
489
|
"""
|
464
490
|
return pulumi.get(self, "resource")
|
465
491
|
|
@@ -500,21 +526,32 @@ class KeysPkcArgs:
|
|
500
526
|
token_label: Optional[pulumi.Input[str]] = None,
|
501
527
|
uuid: Optional[pulumi.Input[str]] = None):
|
502
528
|
"""
|
503
|
-
:param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
|
504
|
-
:param pulumi.Input[str] key_label: The label of the key to use
|
505
|
-
:param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
|
506
|
-
|
507
|
-
:param pulumi.Input[str]
|
508
|
-
|
509
|
-
:param pulumi.Input[
|
510
|
-
:param pulumi.Input[
|
511
|
-
:param pulumi.Input[bool]
|
512
|
-
|
513
|
-
:param pulumi.Input[
|
514
|
-
|
515
|
-
|
516
|
-
|
517
|
-
:param pulumi.Input[
|
529
|
+
:param pulumi.Input[str] key_id: The id of a PKCS#11 key to use.
|
530
|
+
:param pulumi.Input[str] key_label: The label of the key to use.
|
531
|
+
:param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
|
532
|
+
to lookup the local library path.
|
533
|
+
:param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a
|
534
|
+
hexadecimal (prefixed by 0x) string.
|
535
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
|
536
|
+
:param pulumi.Input[str] pin: The PIN for login.
|
537
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
538
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
539
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
|
540
|
+
generation or importing a key into the configured backend even
|
541
|
+
if a key is present, if set to `false` those operations are forbidden
|
542
|
+
if a key exists.
|
543
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
|
544
|
+
configured backend, if `false`, those operations will be forbidden.
|
545
|
+
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
546
|
+
namespace.
|
547
|
+
:param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
|
548
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
549
|
+
:param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to
|
550
|
+
the HSM.
|
551
|
+
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
552
|
+
:param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
|
553
|
+
(e.g. `2305843009213693953`).
|
554
|
+
:param pulumi.Input[str] token_label: The slot token label to use.
|
518
555
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
519
556
|
"""
|
520
557
|
pulumi.set(__self__, "key_id", key_id)
|
@@ -548,7 +585,7 @@ class KeysPkcArgs:
|
|
548
585
|
@pulumi.getter(name="keyId")
|
549
586
|
def key_id(self) -> pulumi.Input[str]:
|
550
587
|
"""
|
551
|
-
The id of a PKCS#11 key to use
|
588
|
+
The id of a PKCS#11 key to use.
|
552
589
|
"""
|
553
590
|
return pulumi.get(self, "key_id")
|
554
591
|
|
@@ -560,7 +597,7 @@ class KeysPkcArgs:
|
|
560
597
|
@pulumi.getter(name="keyLabel")
|
561
598
|
def key_label(self) -> pulumi.Input[str]:
|
562
599
|
"""
|
563
|
-
The label of the key to use
|
600
|
+
The label of the key to use.
|
564
601
|
"""
|
565
602
|
return pulumi.get(self, "key_label")
|
566
603
|
|
@@ -572,7 +609,8 @@ class KeysPkcArgs:
|
|
572
609
|
@pulumi.getter
|
573
610
|
def library(self) -> pulumi.Input[str]:
|
574
611
|
"""
|
575
|
-
The name of the kms_library stanza to use from Vault's config
|
612
|
+
The name of the kms_library stanza to use from Vault's config
|
613
|
+
to lookup the local library path.
|
576
614
|
"""
|
577
615
|
return pulumi.get(self, "library")
|
578
616
|
|
@@ -584,7 +622,8 @@ class KeysPkcArgs:
|
|
584
622
|
@pulumi.getter
|
585
623
|
def mechanism(self) -> pulumi.Input[str]:
|
586
624
|
"""
|
587
|
-
The encryption/decryption mechanism to use, specified as a
|
625
|
+
The encryption/decryption mechanism to use, specified as a
|
626
|
+
hexadecimal (prefixed by 0x) string.
|
588
627
|
"""
|
589
628
|
return pulumi.get(self, "mechanism")
|
590
629
|
|
@@ -596,7 +635,7 @@ class KeysPkcArgs:
|
|
596
635
|
@pulumi.getter
|
597
636
|
def name(self) -> pulumi.Input[str]:
|
598
637
|
"""
|
599
|
-
A unique lowercase name that serves as identifying the key
|
638
|
+
A unique lowercase name that serves as identifying the key.
|
600
639
|
"""
|
601
640
|
return pulumi.get(self, "name")
|
602
641
|
|
@@ -608,7 +647,7 @@ class KeysPkcArgs:
|
|
608
647
|
@pulumi.getter
|
609
648
|
def pin(self) -> pulumi.Input[str]:
|
610
649
|
"""
|
611
|
-
The PIN for login
|
650
|
+
The PIN for login.
|
612
651
|
"""
|
613
652
|
return pulumi.get(self, "pin")
|
614
653
|
|
@@ -620,7 +659,8 @@ class KeysPkcArgs:
|
|
620
659
|
@pulumi.getter(name="allowGenerateKey")
|
621
660
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
622
661
|
"""
|
623
|
-
If no existing key can be found in
|
662
|
+
If no existing key can be found in
|
663
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
624
664
|
"""
|
625
665
|
return pulumi.get(self, "allow_generate_key")
|
626
666
|
|
@@ -632,7 +672,10 @@ class KeysPkcArgs:
|
|
632
672
|
@pulumi.getter(name="allowReplaceKey")
|
633
673
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
634
674
|
"""
|
635
|
-
Controls the ability for Vault to replace through
|
675
|
+
Controls the ability for Vault to replace through
|
676
|
+
generation or importing a key into the configured backend even
|
677
|
+
if a key is present, if set to `false` those operations are forbidden
|
678
|
+
if a key exists.
|
636
679
|
"""
|
637
680
|
return pulumi.get(self, "allow_replace_key")
|
638
681
|
|
@@ -644,7 +687,8 @@ class KeysPkcArgs:
|
|
644
687
|
@pulumi.getter(name="allowStoreKey")
|
645
688
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
646
689
|
"""
|
647
|
-
Controls the ability for Vault to import a key to the
|
690
|
+
Controls the ability for Vault to import a key to the
|
691
|
+
configured backend, if `false`, those operations will be forbidden.
|
648
692
|
"""
|
649
693
|
return pulumi.get(self, "allow_store_key")
|
650
694
|
|
@@ -656,7 +700,8 @@ class KeysPkcArgs:
|
|
656
700
|
@pulumi.getter(name="anyMount")
|
657
701
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
658
702
|
"""
|
659
|
-
|
703
|
+
If `true`, allows usage from any mount point within the
|
704
|
+
namespace.
|
660
705
|
"""
|
661
706
|
return pulumi.get(self, "any_mount")
|
662
707
|
|
@@ -668,7 +713,8 @@ class KeysPkcArgs:
|
|
668
713
|
@pulumi.getter
|
669
714
|
def curve(self) -> Optional[pulumi.Input[str]]:
|
670
715
|
"""
|
671
|
-
|
716
|
+
The curve to use for an ECDSA key. Used when `key_type`
|
717
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
672
718
|
"""
|
673
719
|
return pulumi.get(self, "curve")
|
674
720
|
|
@@ -680,7 +726,8 @@ class KeysPkcArgs:
|
|
680
726
|
@pulumi.getter(name="forceRwSession")
|
681
727
|
def force_rw_session(self) -> Optional[pulumi.Input[str]]:
|
682
728
|
"""
|
683
|
-
Force all operations to open up a read-write session to
|
729
|
+
Force all operations to open up a read-write session to
|
730
|
+
the HSM.
|
684
731
|
"""
|
685
732
|
return pulumi.get(self, "force_rw_session")
|
686
733
|
|
@@ -692,7 +739,7 @@ class KeysPkcArgs:
|
|
692
739
|
@pulumi.getter(name="keyBits")
|
693
740
|
def key_bits(self) -> Optional[pulumi.Input[str]]:
|
694
741
|
"""
|
695
|
-
|
742
|
+
The size in bits for an RSA key.
|
696
743
|
"""
|
697
744
|
return pulumi.get(self, "key_bits")
|
698
745
|
|
@@ -704,7 +751,8 @@ class KeysPkcArgs:
|
|
704
751
|
@pulumi.getter
|
705
752
|
def slot(self) -> Optional[pulumi.Input[str]]:
|
706
753
|
"""
|
707
|
-
The slot number to use, specified as a string in a decimal format
|
754
|
+
The slot number to use, specified as a string in a decimal format
|
755
|
+
(e.g. `2305843009213693953`).
|
708
756
|
"""
|
709
757
|
return pulumi.get(self, "slot")
|
710
758
|
|
@@ -716,7 +764,7 @@ class KeysPkcArgs:
|
|
716
764
|
@pulumi.getter(name="tokenLabel")
|
717
765
|
def token_label(self) -> Optional[pulumi.Input[str]]:
|
718
766
|
"""
|
719
|
-
The slot token label to use
|
767
|
+
The slot token label to use.
|
720
768
|
"""
|
721
769
|
return pulumi.get(self, "token_label")
|
722
770
|
|