pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -24,7 +24,10 @@ class KeysArgs:
24
24
  The set of arguments for constructing a Keys resource.
25
25
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
26
26
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
27
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
27
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
+ The value should not contain leading or trailing forward slashes.
29
+ The `namespace` is always relative to the provider's configured namespace.
30
+ *Available only for Vault Enterprise*.
28
31
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
29
32
  """
30
33
  if aws is not None:
@@ -64,7 +67,10 @@ class KeysArgs:
64
67
  @pulumi.getter
65
68
  def namespace(self) -> Optional[pulumi.Input[str]]:
66
69
  """
67
- Target namespace. (requires Enterprise)
70
+ The namespace to provision the resource in.
71
+ The value should not contain leading or trailing forward slashes.
72
+ The `namespace` is always relative to the provider's configured namespace.
73
+ *Available only for Vault Enterprise*.
68
74
  """
69
75
  return pulumi.get(self, "namespace")
70
76
 
@@ -96,7 +102,10 @@ class _KeysState:
96
102
  Input properties used for looking up and filtering Keys resources.
97
103
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
98
104
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
99
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
105
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
106
+ The value should not contain leading or trailing forward slashes.
107
+ The `namespace` is always relative to the provider's configured namespace.
108
+ *Available only for Vault Enterprise*.
100
109
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
101
110
  """
102
111
  if aws is not None:
@@ -136,7 +145,10 @@ class _KeysState:
136
145
  @pulumi.getter
137
146
  def namespace(self) -> Optional[pulumi.Input[str]]:
138
147
  """
139
- Target namespace. (requires Enterprise)
148
+ The namespace to provision the resource in.
149
+ The value should not contain leading or trailing forward slashes.
150
+ The `namespace` is always relative to the provider's configured namespace.
151
+ *Available only for Vault Enterprise*.
140
152
  """
141
153
  return pulumi.get(self, "namespace")
142
154
 
@@ -184,7 +196,10 @@ class Keys(pulumi.CustomResource):
184
196
  :param pulumi.ResourceOptions opts: Options for the resource.
185
197
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
186
198
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
187
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
199
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
200
+ The value should not contain leading or trailing forward slashes.
201
+ The `namespace` is always relative to the provider's configured namespace.
202
+ *Available only for Vault Enterprise*.
188
203
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
189
204
  """
190
205
  ...
@@ -261,7 +276,10 @@ class Keys(pulumi.CustomResource):
261
276
  :param pulumi.ResourceOptions opts: Options for the resource.
262
277
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
263
278
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
264
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
279
+ :param pulumi.Input[str] namespace: The namespace to provision the resource in.
280
+ The value should not contain leading or trailing forward slashes.
281
+ The `namespace` is always relative to the provider's configured namespace.
282
+ *Available only for Vault Enterprise*.
265
283
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
266
284
  """
267
285
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -294,7 +312,10 @@ class Keys(pulumi.CustomResource):
294
312
  @pulumi.getter
295
313
  def namespace(self) -> pulumi.Output[Optional[str]]:
296
314
  """
297
- Target namespace. (requires Enterprise)
315
+ The namespace to provision the resource in.
316
+ The value should not contain leading or trailing forward slashes.
317
+ The `namespace` is always relative to the provider's configured namespace.
318
+ *Available only for Vault Enterprise*.
298
319
  """
299
320
  return pulumi.get(self, "namespace")
300
321
 
@@ -66,19 +66,26 @@ class KeysAw(dict):
66
66
  region: Optional[str] = None,
67
67
  uuid: Optional[str] = None):
68
68
  """
69
- :param str access_key: The AWS access key to use
70
- :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
71
- :param str key_type: The type of key to use
72
- :param str kms_key: An identifier for the key
73
- :param str name: A unique lowercase name that serves as identifying the key
74
- :param str secret_key: The AWS secret key to use
75
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
76
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
77
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
78
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
79
- :param str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
80
- :param str endpoint: Used to specify a custom AWS endpoint
81
- :param str region: The AWS region where the keys are stored (or will be stored)
69
+ :param str access_key: The AWS access key to use.
70
+ :param str key_bits: The size in bits for an RSA key.
71
+ :param str key_type: The type of key to use.
72
+ :param str kms_key: An identifier for the key.
73
+ :param str name: A unique lowercase name that serves as identifying the key.
74
+ :param str secret_key: The AWS access key to use.
75
+ :param bool allow_generate_key: If no existing key can be found in
76
+ the referenced backend, instructs Vault to generate a key within the backend.
77
+ :param bool allow_replace_key: Controls the ability for Vault to replace through
78
+ generation or importing a key into the configured backend even
79
+ if a key is present, if set to `false` those operations are forbidden
80
+ if a key exists.
81
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the
82
+ configured backend, if `false`, those operations will be forbidden.
83
+ :param bool any_mount: If `true`, allows usage from any mount point within the
84
+ namespace.
85
+ :param str curve: The curve to use for an ECDSA key. Used when `key_type`
86
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
87
+ :param str endpoint: Used to specify a custom AWS endpoint.
88
+ :param str region: The AWS region where the keys are stored (or will be stored).
82
89
  :param str uuid: ID of the managed key read from Vault
83
90
  """
84
91
  pulumi.set(__self__, "access_key", access_key)
@@ -108,7 +115,7 @@ class KeysAw(dict):
108
115
  @pulumi.getter(name="accessKey")
109
116
  def access_key(self) -> str:
110
117
  """
111
- The AWS access key to use
118
+ The AWS access key to use.
112
119
  """
113
120
  return pulumi.get(self, "access_key")
114
121
 
@@ -116,7 +123,7 @@ class KeysAw(dict):
116
123
  @pulumi.getter(name="keyBits")
117
124
  def key_bits(self) -> str:
118
125
  """
119
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
126
+ The size in bits for an RSA key.
120
127
  """
121
128
  return pulumi.get(self, "key_bits")
122
129
 
@@ -124,7 +131,7 @@ class KeysAw(dict):
124
131
  @pulumi.getter(name="keyType")
125
132
  def key_type(self) -> str:
126
133
  """
127
- The type of key to use
134
+ The type of key to use.
128
135
  """
129
136
  return pulumi.get(self, "key_type")
130
137
 
@@ -132,7 +139,7 @@ class KeysAw(dict):
132
139
  @pulumi.getter(name="kmsKey")
133
140
  def kms_key(self) -> str:
134
141
  """
135
- An identifier for the key
142
+ An identifier for the key.
136
143
  """
137
144
  return pulumi.get(self, "kms_key")
138
145
 
@@ -140,7 +147,7 @@ class KeysAw(dict):
140
147
  @pulumi.getter
141
148
  def name(self) -> str:
142
149
  """
143
- A unique lowercase name that serves as identifying the key
150
+ A unique lowercase name that serves as identifying the key.
144
151
  """
145
152
  return pulumi.get(self, "name")
146
153
 
@@ -148,7 +155,7 @@ class KeysAw(dict):
148
155
  @pulumi.getter(name="secretKey")
149
156
  def secret_key(self) -> str:
150
157
  """
151
- The AWS secret key to use
158
+ The AWS access key to use.
152
159
  """
153
160
  return pulumi.get(self, "secret_key")
154
161
 
@@ -156,7 +163,8 @@ class KeysAw(dict):
156
163
  @pulumi.getter(name="allowGenerateKey")
157
164
  def allow_generate_key(self) -> Optional[bool]:
158
165
  """
159
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
166
+ If no existing key can be found in
167
+ the referenced backend, instructs Vault to generate a key within the backend.
160
168
  """
161
169
  return pulumi.get(self, "allow_generate_key")
162
170
 
@@ -164,7 +172,10 @@ class KeysAw(dict):
164
172
  @pulumi.getter(name="allowReplaceKey")
165
173
  def allow_replace_key(self) -> Optional[bool]:
166
174
  """
167
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
175
+ Controls the ability for Vault to replace through
176
+ generation or importing a key into the configured backend even
177
+ if a key is present, if set to `false` those operations are forbidden
178
+ if a key exists.
168
179
  """
169
180
  return pulumi.get(self, "allow_replace_key")
170
181
 
@@ -172,7 +183,8 @@ class KeysAw(dict):
172
183
  @pulumi.getter(name="allowStoreKey")
173
184
  def allow_store_key(self) -> Optional[bool]:
174
185
  """
175
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
186
+ Controls the ability for Vault to import a key to the
187
+ configured backend, if `false`, those operations will be forbidden.
176
188
  """
177
189
  return pulumi.get(self, "allow_store_key")
178
190
 
@@ -180,7 +192,8 @@ class KeysAw(dict):
180
192
  @pulumi.getter(name="anyMount")
181
193
  def any_mount(self) -> Optional[bool]:
182
194
  """
183
- Allow usage from any mount point within the namespace if 'true'
195
+ If `true`, allows usage from any mount point within the
196
+ namespace.
184
197
  """
185
198
  return pulumi.get(self, "any_mount")
186
199
 
@@ -188,7 +201,8 @@ class KeysAw(dict):
188
201
  @pulumi.getter
189
202
  def curve(self) -> Optional[str]:
190
203
  """
191
- The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
204
+ The curve to use for an ECDSA key. Used when `key_type`
205
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
192
206
  """
193
207
  return pulumi.get(self, "curve")
194
208
 
@@ -196,7 +210,7 @@ class KeysAw(dict):
196
210
  @pulumi.getter
197
211
  def endpoint(self) -> Optional[str]:
198
212
  """
199
- Used to specify a custom AWS endpoint
213
+ Used to specify a custom AWS endpoint.
200
214
  """
201
215
  return pulumi.get(self, "endpoint")
202
216
 
@@ -204,7 +218,7 @@ class KeysAw(dict):
204
218
  @pulumi.getter
205
219
  def region(self) -> Optional[str]:
206
220
  """
207
- The AWS region where the keys are stored (or will be stored)
221
+ The AWS region where the keys are stored (or will be stored).
208
222
  """
209
223
  return pulumi.get(self, "region")
210
224
 
@@ -273,20 +287,26 @@ class KeysAzure(dict):
273
287
  resource: Optional[str] = None,
274
288
  uuid: Optional[str] = None):
275
289
  """
276
- :param str client_id: The client id for credentials to query the Azure APIs
277
- :param str client_secret: The client secret for credentials to query the Azure APIs
278
- :param str key_name: The Key Vault key to use for encryption and decryption
279
- :param str key_type: The type of key to use
280
- :param str name: A unique lowercase name that serves as identifying the key
281
- :param str tenant_id: The tenant id for the Azure Active Directory organization
282
- :param str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
283
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
284
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
285
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
286
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
287
- :param str environment: The Azure Cloud environment API endpoints to use
288
- :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
289
- :param str resource: The Azure Key Vault resource's DNS Suffix to connect to
290
+ :param str client_id: The client id for credentials to query the Azure APIs.
291
+ :param str client_secret: The client secret for credentials to query the Azure APIs.
292
+ :param str key_name: The Key Vault key to use for encryption and decryption.
293
+ :param str key_type: The type of key to use.
294
+ :param str name: A unique lowercase name that serves as identifying the key.
295
+ :param str tenant_id: The tenant id for the Azure Active Directory organization.
296
+ :param str vault_name: The Key Vault vault to use for encryption and decryption.
297
+ :param bool allow_generate_key: If no existing key can be found in
298
+ the referenced backend, instructs Vault to generate a key within the backend.
299
+ :param bool allow_replace_key: Controls the ability for Vault to replace through
300
+ generation or importing a key into the configured backend even
301
+ if a key is present, if set to `false` those operations are forbidden
302
+ if a key exists.
303
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the
304
+ configured backend, if `false`, those operations will be forbidden.
305
+ :param bool any_mount: If `true`, allows usage from any mount point within the
306
+ namespace.
307
+ :param str environment: The Azure Cloud environment API endpoints to use.
308
+ :param str key_bits: The size in bits for an RSA key.
309
+ :param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
290
310
  :param str uuid: ID of the managed key read from Vault
291
311
  """
292
312
  pulumi.set(__self__, "client_id", client_id)
@@ -317,7 +337,7 @@ class KeysAzure(dict):
317
337
  @pulumi.getter(name="clientId")
318
338
  def client_id(self) -> str:
319
339
  """
320
- The client id for credentials to query the Azure APIs
340
+ The client id for credentials to query the Azure APIs.
321
341
  """
322
342
  return pulumi.get(self, "client_id")
323
343
 
@@ -325,7 +345,7 @@ class KeysAzure(dict):
325
345
  @pulumi.getter(name="clientSecret")
326
346
  def client_secret(self) -> str:
327
347
  """
328
- The client secret for credentials to query the Azure APIs
348
+ The client secret for credentials to query the Azure APIs.
329
349
  """
330
350
  return pulumi.get(self, "client_secret")
331
351
 
@@ -333,7 +353,7 @@ class KeysAzure(dict):
333
353
  @pulumi.getter(name="keyName")
334
354
  def key_name(self) -> str:
335
355
  """
336
- The Key Vault key to use for encryption and decryption
356
+ The Key Vault key to use for encryption and decryption.
337
357
  """
338
358
  return pulumi.get(self, "key_name")
339
359
 
@@ -341,7 +361,7 @@ class KeysAzure(dict):
341
361
  @pulumi.getter(name="keyType")
342
362
  def key_type(self) -> str:
343
363
  """
344
- The type of key to use
364
+ The type of key to use.
345
365
  """
346
366
  return pulumi.get(self, "key_type")
347
367
 
@@ -349,7 +369,7 @@ class KeysAzure(dict):
349
369
  @pulumi.getter
350
370
  def name(self) -> str:
351
371
  """
352
- A unique lowercase name that serves as identifying the key
372
+ A unique lowercase name that serves as identifying the key.
353
373
  """
354
374
  return pulumi.get(self, "name")
355
375
 
@@ -357,7 +377,7 @@ class KeysAzure(dict):
357
377
  @pulumi.getter(name="tenantId")
358
378
  def tenant_id(self) -> str:
359
379
  """
360
- The tenant id for the Azure Active Directory organization
380
+ The tenant id for the Azure Active Directory organization.
361
381
  """
362
382
  return pulumi.get(self, "tenant_id")
363
383
 
@@ -365,7 +385,7 @@ class KeysAzure(dict):
365
385
  @pulumi.getter(name="vaultName")
366
386
  def vault_name(self) -> str:
367
387
  """
368
- The Key Vault vault to use the encryption keys for encryption and decryption
388
+ The Key Vault vault to use for encryption and decryption.
369
389
  """
370
390
  return pulumi.get(self, "vault_name")
371
391
 
@@ -373,7 +393,8 @@ class KeysAzure(dict):
373
393
  @pulumi.getter(name="allowGenerateKey")
374
394
  def allow_generate_key(self) -> Optional[bool]:
375
395
  """
376
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
396
+ If no existing key can be found in
397
+ the referenced backend, instructs Vault to generate a key within the backend.
377
398
  """
378
399
  return pulumi.get(self, "allow_generate_key")
379
400
 
@@ -381,7 +402,10 @@ class KeysAzure(dict):
381
402
  @pulumi.getter(name="allowReplaceKey")
382
403
  def allow_replace_key(self) -> Optional[bool]:
383
404
  """
384
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
405
+ Controls the ability for Vault to replace through
406
+ generation or importing a key into the configured backend even
407
+ if a key is present, if set to `false` those operations are forbidden
408
+ if a key exists.
385
409
  """
386
410
  return pulumi.get(self, "allow_replace_key")
387
411
 
@@ -389,7 +413,8 @@ class KeysAzure(dict):
389
413
  @pulumi.getter(name="allowStoreKey")
390
414
  def allow_store_key(self) -> Optional[bool]:
391
415
  """
392
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
416
+ Controls the ability for Vault to import a key to the
417
+ configured backend, if `false`, those operations will be forbidden.
393
418
  """
394
419
  return pulumi.get(self, "allow_store_key")
395
420
 
@@ -397,7 +422,8 @@ class KeysAzure(dict):
397
422
  @pulumi.getter(name="anyMount")
398
423
  def any_mount(self) -> Optional[bool]:
399
424
  """
400
- Allow usage from any mount point within the namespace if 'true'
425
+ If `true`, allows usage from any mount point within the
426
+ namespace.
401
427
  """
402
428
  return pulumi.get(self, "any_mount")
403
429
 
@@ -405,7 +431,7 @@ class KeysAzure(dict):
405
431
  @pulumi.getter
406
432
  def environment(self) -> Optional[str]:
407
433
  """
408
- The Azure Cloud environment API endpoints to use
434
+ The Azure Cloud environment API endpoints to use.
409
435
  """
410
436
  return pulumi.get(self, "environment")
411
437
 
@@ -413,7 +439,7 @@ class KeysAzure(dict):
413
439
  @pulumi.getter(name="keyBits")
414
440
  def key_bits(self) -> Optional[str]:
415
441
  """
416
- The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
442
+ The size in bits for an RSA key.
417
443
  """
418
444
  return pulumi.get(self, "key_bits")
419
445
 
@@ -421,7 +447,7 @@ class KeysAzure(dict):
421
447
  @pulumi.getter
422
448
  def resource(self) -> Optional[str]:
423
449
  """
424
- The Azure Key Vault resource's DNS Suffix to connect to
450
+ The Azure Key Vault resource's DNS Suffix to connect to.
425
451
  """
426
452
  return pulumi.get(self, "resource")
427
453
 
@@ -487,21 +513,32 @@ class KeysPkc(dict):
487
513
  token_label: Optional[str] = None,
488
514
  uuid: Optional[str] = None):
489
515
  """
490
- :param str key_id: The id of a PKCS#11 key to use
491
- :param str key_label: The label of the key to use
492
- :param str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
493
- :param str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
494
- :param str name: A unique lowercase name that serves as identifying the key
495
- :param str pin: The PIN for login
496
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
497
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
498
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
499
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
500
- :param str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
501
- :param str force_rw_session: Force all operations to open up a read-write session to the HSM
502
- :param str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
503
- :param str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
504
- :param str token_label: The slot token label to use
516
+ :param str key_id: The id of a PKCS#11 key to use.
517
+ :param str key_label: The label of the key to use.
518
+ :param str library: The name of the kms_library stanza to use from Vault's config
519
+ to lookup the local library path.
520
+ :param str mechanism: The encryption/decryption mechanism to use, specified as a
521
+ hexadecimal (prefixed by 0x) string.
522
+ :param str name: A unique lowercase name that serves as identifying the key.
523
+ :param str pin: The PIN for login.
524
+ :param bool allow_generate_key: If no existing key can be found in
525
+ the referenced backend, instructs Vault to generate a key within the backend.
526
+ :param bool allow_replace_key: Controls the ability for Vault to replace through
527
+ generation or importing a key into the configured backend even
528
+ if a key is present, if set to `false` those operations are forbidden
529
+ if a key exists.
530
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the
531
+ configured backend, if `false`, those operations will be forbidden.
532
+ :param bool any_mount: If `true`, allows usage from any mount point within the
533
+ namespace.
534
+ :param str curve: The curve to use for an ECDSA key. Used when `key_type`
535
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
536
+ :param str force_rw_session: Force all operations to open up a read-write session to
537
+ the HSM.
538
+ :param str key_bits: The size in bits for an RSA key.
539
+ :param str slot: The slot number to use, specified as a string in a decimal format
540
+ (e.g. `2305843009213693953`).
541
+ :param str token_label: The slot token label to use.
505
542
  :param str uuid: ID of the managed key read from Vault
506
543
  """
507
544
  pulumi.set(__self__, "key_id", key_id)
@@ -535,7 +572,7 @@ class KeysPkc(dict):
535
572
  @pulumi.getter(name="keyId")
536
573
  def key_id(self) -> str:
537
574
  """
538
- The id of a PKCS#11 key to use
575
+ The id of a PKCS#11 key to use.
539
576
  """
540
577
  return pulumi.get(self, "key_id")
541
578
 
@@ -543,7 +580,7 @@ class KeysPkc(dict):
543
580
  @pulumi.getter(name="keyLabel")
544
581
  def key_label(self) -> str:
545
582
  """
546
- The label of the key to use
583
+ The label of the key to use.
547
584
  """
548
585
  return pulumi.get(self, "key_label")
549
586
 
@@ -551,7 +588,8 @@ class KeysPkc(dict):
551
588
  @pulumi.getter
552
589
  def library(self) -> str:
553
590
  """
554
- The name of the kms_library stanza to use from Vault's config to lookup the local library path
591
+ The name of the kms_library stanza to use from Vault's config
592
+ to lookup the local library path.
555
593
  """
556
594
  return pulumi.get(self, "library")
557
595
 
@@ -559,7 +597,8 @@ class KeysPkc(dict):
559
597
  @pulumi.getter
560
598
  def mechanism(self) -> str:
561
599
  """
562
- The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
600
+ The encryption/decryption mechanism to use, specified as a
601
+ hexadecimal (prefixed by 0x) string.
563
602
  """
564
603
  return pulumi.get(self, "mechanism")
565
604
 
@@ -567,7 +606,7 @@ class KeysPkc(dict):
567
606
  @pulumi.getter
568
607
  def name(self) -> str:
569
608
  """
570
- A unique lowercase name that serves as identifying the key
609
+ A unique lowercase name that serves as identifying the key.
571
610
  """
572
611
  return pulumi.get(self, "name")
573
612
 
@@ -575,7 +614,7 @@ class KeysPkc(dict):
575
614
  @pulumi.getter
576
615
  def pin(self) -> str:
577
616
  """
578
- The PIN for login
617
+ The PIN for login.
579
618
  """
580
619
  return pulumi.get(self, "pin")
581
620
 
@@ -583,7 +622,8 @@ class KeysPkc(dict):
583
622
  @pulumi.getter(name="allowGenerateKey")
584
623
  def allow_generate_key(self) -> Optional[bool]:
585
624
  """
586
- If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
625
+ If no existing key can be found in
626
+ the referenced backend, instructs Vault to generate a key within the backend.
587
627
  """
588
628
  return pulumi.get(self, "allow_generate_key")
589
629
 
@@ -591,7 +631,10 @@ class KeysPkc(dict):
591
631
  @pulumi.getter(name="allowReplaceKey")
592
632
  def allow_replace_key(self) -> Optional[bool]:
593
633
  """
594
- Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
634
+ Controls the ability for Vault to replace through
635
+ generation or importing a key into the configured backend even
636
+ if a key is present, if set to `false` those operations are forbidden
637
+ if a key exists.
595
638
  """
596
639
  return pulumi.get(self, "allow_replace_key")
597
640
 
@@ -599,7 +642,8 @@ class KeysPkc(dict):
599
642
  @pulumi.getter(name="allowStoreKey")
600
643
  def allow_store_key(self) -> Optional[bool]:
601
644
  """
602
- Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
645
+ Controls the ability for Vault to import a key to the
646
+ configured backend, if `false`, those operations will be forbidden.
603
647
  """
604
648
  return pulumi.get(self, "allow_store_key")
605
649
 
@@ -607,7 +651,8 @@ class KeysPkc(dict):
607
651
  @pulumi.getter(name="anyMount")
608
652
  def any_mount(self) -> Optional[bool]:
609
653
  """
610
- Allow usage from any mount point within the namespace if 'true'
654
+ If `true`, allows usage from any mount point within the
655
+ namespace.
611
656
  """
612
657
  return pulumi.get(self, "any_mount")
613
658
 
@@ -615,7 +660,8 @@ class KeysPkc(dict):
615
660
  @pulumi.getter
616
661
  def curve(self) -> Optional[str]:
617
662
  """
618
- Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
663
+ The curve to use for an ECDSA key. Used when `key_type`
664
+ is `ECDSA`. Required if `allow_generate_key` is `true`.
619
665
  """
620
666
  return pulumi.get(self, "curve")
621
667
 
@@ -623,7 +669,8 @@ class KeysPkc(dict):
623
669
  @pulumi.getter(name="forceRwSession")
624
670
  def force_rw_session(self) -> Optional[str]:
625
671
  """
626
- Force all operations to open up a read-write session to the HSM
672
+ Force all operations to open up a read-write session to
673
+ the HSM.
627
674
  """
628
675
  return pulumi.get(self, "force_rw_session")
629
676
 
@@ -631,7 +678,7 @@ class KeysPkc(dict):
631
678
  @pulumi.getter(name="keyBits")
632
679
  def key_bits(self) -> Optional[str]:
633
680
  """
634
- Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
681
+ The size in bits for an RSA key.
635
682
  """
636
683
  return pulumi.get(self, "key_bits")
637
684
 
@@ -639,7 +686,8 @@ class KeysPkc(dict):
639
686
  @pulumi.getter
640
687
  def slot(self) -> Optional[str]:
641
688
  """
642
- The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
689
+ The slot number to use, specified as a string in a decimal format
690
+ (e.g. `2305843009213693953`).
643
691
  """
644
692
  return pulumi.get(self, "slot")
645
693
 
@@ -647,7 +695,7 @@ class KeysPkc(dict):
647
695
  @pulumi.getter(name="tokenLabel")
648
696
  def token_label(self) -> Optional[str]:
649
697
  """
650
- The slot token label to use
698
+ The slot token label to use.
651
699
  """
652
700
  return pulumi.get(self, "token_label")
653
701
 
pulumi_vault/mfa_duo.py CHANGED
@@ -328,6 +328,7 @@ class MfaDuo(pulumi.CustomResource):
328
328
 
329
329
  ## Example Usage
330
330
 
331
+ <!--Start PulumiCodeChooser -->
331
332
  ```python
332
333
  import pulumi
333
334
  import pulumi_vault as vault
@@ -335,13 +336,13 @@ class MfaDuo(pulumi.CustomResource):
335
336
  userpass = vault.AuthBackend("userpass",
336
337
  type="userpass",
337
338
  path="userpass")
338
- my_duo = vault.MfaDuo("my_duo",
339
- name="my_duo",
339
+ my_duo = vault.MfaDuo("myDuo",
340
340
  mount_accessor=userpass.accessor,
341
341
  secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
342
342
  integration_key="BIACEUEAXI20BNWTEYXT",
343
343
  api_hostname="api-2b5c39f5.duosecurity.com")
344
344
  ```
345
+ <!--End PulumiCodeChooser -->
345
346
 
346
347
  ## Import
347
348
 
@@ -382,6 +383,7 @@ class MfaDuo(pulumi.CustomResource):
382
383
 
383
384
  ## Example Usage
384
385
 
386
+ <!--Start PulumiCodeChooser -->
385
387
  ```python
386
388
  import pulumi
387
389
  import pulumi_vault as vault
@@ -389,13 +391,13 @@ class MfaDuo(pulumi.CustomResource):
389
391
  userpass = vault.AuthBackend("userpass",
390
392
  type="userpass",
391
393
  path="userpass")
392
- my_duo = vault.MfaDuo("my_duo",
393
- name="my_duo",
394
+ my_duo = vault.MfaDuo("myDuo",
394
395
  mount_accessor=userpass.accessor,
395
396
  secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
396
397
  integration_key="BIACEUEAXI20BNWTEYXT",
397
398
  api_hostname="api-2b5c39f5.duosecurity.com")
398
399
  ```
400
+ <!--End PulumiCodeChooser -->
399
401
 
400
402
  ## Import
401
403