pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/keys.py
CHANGED
@@ -24,7 +24,10 @@ class KeysArgs:
|
|
24
24
|
The set of arguments for constructing a Keys resource.
|
25
25
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
|
26
26
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
|
27
|
-
:param pulumi.Input[str] namespace:
|
27
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
|
+
The value should not contain leading or trailing forward slashes.
|
29
|
+
The `namespace` is always relative to the provider's configured namespace.
|
30
|
+
*Available only for Vault Enterprise*.
|
28
31
|
:param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
|
29
32
|
"""
|
30
33
|
if aws is not None:
|
@@ -64,7 +67,10 @@ class KeysArgs:
|
|
64
67
|
@pulumi.getter
|
65
68
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
66
69
|
"""
|
67
|
-
|
70
|
+
The namespace to provision the resource in.
|
71
|
+
The value should not contain leading or trailing forward slashes.
|
72
|
+
The `namespace` is always relative to the provider's configured namespace.
|
73
|
+
*Available only for Vault Enterprise*.
|
68
74
|
"""
|
69
75
|
return pulumi.get(self, "namespace")
|
70
76
|
|
@@ -96,7 +102,10 @@ class _KeysState:
|
|
96
102
|
Input properties used for looking up and filtering Keys resources.
|
97
103
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
|
98
104
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
|
99
|
-
:param pulumi.Input[str] namespace:
|
105
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
106
|
+
The value should not contain leading or trailing forward slashes.
|
107
|
+
The `namespace` is always relative to the provider's configured namespace.
|
108
|
+
*Available only for Vault Enterprise*.
|
100
109
|
:param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
|
101
110
|
"""
|
102
111
|
if aws is not None:
|
@@ -136,7 +145,10 @@ class _KeysState:
|
|
136
145
|
@pulumi.getter
|
137
146
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
138
147
|
"""
|
139
|
-
|
148
|
+
The namespace to provision the resource in.
|
149
|
+
The value should not contain leading or trailing forward slashes.
|
150
|
+
The `namespace` is always relative to the provider's configured namespace.
|
151
|
+
*Available only for Vault Enterprise*.
|
140
152
|
"""
|
141
153
|
return pulumi.get(self, "namespace")
|
142
154
|
|
@@ -184,7 +196,10 @@ class Keys(pulumi.CustomResource):
|
|
184
196
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
185
197
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
|
186
198
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
|
187
|
-
:param pulumi.Input[str] namespace:
|
199
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
200
|
+
The value should not contain leading or trailing forward slashes.
|
201
|
+
The `namespace` is always relative to the provider's configured namespace.
|
202
|
+
*Available only for Vault Enterprise*.
|
188
203
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
|
189
204
|
"""
|
190
205
|
...
|
@@ -261,7 +276,10 @@ class Keys(pulumi.CustomResource):
|
|
261
276
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
262
277
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
|
263
278
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
|
264
|
-
:param pulumi.Input[str] namespace:
|
279
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
280
|
+
The value should not contain leading or trailing forward slashes.
|
281
|
+
The `namespace` is always relative to the provider's configured namespace.
|
282
|
+
*Available only for Vault Enterprise*.
|
265
283
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
|
266
284
|
"""
|
267
285
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -294,7 +312,10 @@ class Keys(pulumi.CustomResource):
|
|
294
312
|
@pulumi.getter
|
295
313
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
296
314
|
"""
|
297
|
-
|
315
|
+
The namespace to provision the resource in.
|
316
|
+
The value should not contain leading or trailing forward slashes.
|
317
|
+
The `namespace` is always relative to the provider's configured namespace.
|
318
|
+
*Available only for Vault Enterprise*.
|
298
319
|
"""
|
299
320
|
return pulumi.get(self, "namespace")
|
300
321
|
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -66,19 +66,26 @@ class KeysAw(dict):
|
|
66
66
|
region: Optional[str] = None,
|
67
67
|
uuid: Optional[str] = None):
|
68
68
|
"""
|
69
|
-
:param str access_key: The AWS access key to use
|
70
|
-
:param str key_bits: The size in bits for an RSA key.
|
71
|
-
:param str key_type: The type of key to use
|
72
|
-
:param str kms_key: An identifier for the key
|
73
|
-
:param str name: A unique lowercase name that serves as identifying the key
|
74
|
-
:param str secret_key: The AWS
|
75
|
-
:param bool allow_generate_key: If no existing key can be found in
|
76
|
-
|
77
|
-
:param bool
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
:param
|
69
|
+
:param str access_key: The AWS access key to use.
|
70
|
+
:param str key_bits: The size in bits for an RSA key.
|
71
|
+
:param str key_type: The type of key to use.
|
72
|
+
:param str kms_key: An identifier for the key.
|
73
|
+
:param str name: A unique lowercase name that serves as identifying the key.
|
74
|
+
:param str secret_key: The AWS access key to use.
|
75
|
+
:param bool allow_generate_key: If no existing key can be found in
|
76
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
77
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through
|
78
|
+
generation or importing a key into the configured backend even
|
79
|
+
if a key is present, if set to `false` those operations are forbidden
|
80
|
+
if a key exists.
|
81
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the
|
82
|
+
configured backend, if `false`, those operations will be forbidden.
|
83
|
+
:param bool any_mount: If `true`, allows usage from any mount point within the
|
84
|
+
namespace.
|
85
|
+
:param str curve: The curve to use for an ECDSA key. Used when `key_type`
|
86
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
87
|
+
:param str endpoint: Used to specify a custom AWS endpoint.
|
88
|
+
:param str region: The AWS region where the keys are stored (or will be stored).
|
82
89
|
:param str uuid: ID of the managed key read from Vault
|
83
90
|
"""
|
84
91
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -108,7 +115,7 @@ class KeysAw(dict):
|
|
108
115
|
@pulumi.getter(name="accessKey")
|
109
116
|
def access_key(self) -> str:
|
110
117
|
"""
|
111
|
-
The AWS access key to use
|
118
|
+
The AWS access key to use.
|
112
119
|
"""
|
113
120
|
return pulumi.get(self, "access_key")
|
114
121
|
|
@@ -116,7 +123,7 @@ class KeysAw(dict):
|
|
116
123
|
@pulumi.getter(name="keyBits")
|
117
124
|
def key_bits(self) -> str:
|
118
125
|
"""
|
119
|
-
The size in bits for an RSA key.
|
126
|
+
The size in bits for an RSA key.
|
120
127
|
"""
|
121
128
|
return pulumi.get(self, "key_bits")
|
122
129
|
|
@@ -124,7 +131,7 @@ class KeysAw(dict):
|
|
124
131
|
@pulumi.getter(name="keyType")
|
125
132
|
def key_type(self) -> str:
|
126
133
|
"""
|
127
|
-
The type of key to use
|
134
|
+
The type of key to use.
|
128
135
|
"""
|
129
136
|
return pulumi.get(self, "key_type")
|
130
137
|
|
@@ -132,7 +139,7 @@ class KeysAw(dict):
|
|
132
139
|
@pulumi.getter(name="kmsKey")
|
133
140
|
def kms_key(self) -> str:
|
134
141
|
"""
|
135
|
-
An identifier for the key
|
142
|
+
An identifier for the key.
|
136
143
|
"""
|
137
144
|
return pulumi.get(self, "kms_key")
|
138
145
|
|
@@ -140,7 +147,7 @@ class KeysAw(dict):
|
|
140
147
|
@pulumi.getter
|
141
148
|
def name(self) -> str:
|
142
149
|
"""
|
143
|
-
A unique lowercase name that serves as identifying the key
|
150
|
+
A unique lowercase name that serves as identifying the key.
|
144
151
|
"""
|
145
152
|
return pulumi.get(self, "name")
|
146
153
|
|
@@ -148,7 +155,7 @@ class KeysAw(dict):
|
|
148
155
|
@pulumi.getter(name="secretKey")
|
149
156
|
def secret_key(self) -> str:
|
150
157
|
"""
|
151
|
-
The AWS
|
158
|
+
The AWS access key to use.
|
152
159
|
"""
|
153
160
|
return pulumi.get(self, "secret_key")
|
154
161
|
|
@@ -156,7 +163,8 @@ class KeysAw(dict):
|
|
156
163
|
@pulumi.getter(name="allowGenerateKey")
|
157
164
|
def allow_generate_key(self) -> Optional[bool]:
|
158
165
|
"""
|
159
|
-
If no existing key can be found in
|
166
|
+
If no existing key can be found in
|
167
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
160
168
|
"""
|
161
169
|
return pulumi.get(self, "allow_generate_key")
|
162
170
|
|
@@ -164,7 +172,10 @@ class KeysAw(dict):
|
|
164
172
|
@pulumi.getter(name="allowReplaceKey")
|
165
173
|
def allow_replace_key(self) -> Optional[bool]:
|
166
174
|
"""
|
167
|
-
Controls the ability for Vault to replace through
|
175
|
+
Controls the ability for Vault to replace through
|
176
|
+
generation or importing a key into the configured backend even
|
177
|
+
if a key is present, if set to `false` those operations are forbidden
|
178
|
+
if a key exists.
|
168
179
|
"""
|
169
180
|
return pulumi.get(self, "allow_replace_key")
|
170
181
|
|
@@ -172,7 +183,8 @@ class KeysAw(dict):
|
|
172
183
|
@pulumi.getter(name="allowStoreKey")
|
173
184
|
def allow_store_key(self) -> Optional[bool]:
|
174
185
|
"""
|
175
|
-
Controls the ability for Vault to import a key to the
|
186
|
+
Controls the ability for Vault to import a key to the
|
187
|
+
configured backend, if `false`, those operations will be forbidden.
|
176
188
|
"""
|
177
189
|
return pulumi.get(self, "allow_store_key")
|
178
190
|
|
@@ -180,7 +192,8 @@ class KeysAw(dict):
|
|
180
192
|
@pulumi.getter(name="anyMount")
|
181
193
|
def any_mount(self) -> Optional[bool]:
|
182
194
|
"""
|
183
|
-
|
195
|
+
If `true`, allows usage from any mount point within the
|
196
|
+
namespace.
|
184
197
|
"""
|
185
198
|
return pulumi.get(self, "any_mount")
|
186
199
|
|
@@ -188,7 +201,8 @@ class KeysAw(dict):
|
|
188
201
|
@pulumi.getter
|
189
202
|
def curve(self) -> Optional[str]:
|
190
203
|
"""
|
191
|
-
The curve to use for an ECDSA key. Used when key_type
|
204
|
+
The curve to use for an ECDSA key. Used when `key_type`
|
205
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
192
206
|
"""
|
193
207
|
return pulumi.get(self, "curve")
|
194
208
|
|
@@ -196,7 +210,7 @@ class KeysAw(dict):
|
|
196
210
|
@pulumi.getter
|
197
211
|
def endpoint(self) -> Optional[str]:
|
198
212
|
"""
|
199
|
-
Used to specify a custom AWS endpoint
|
213
|
+
Used to specify a custom AWS endpoint.
|
200
214
|
"""
|
201
215
|
return pulumi.get(self, "endpoint")
|
202
216
|
|
@@ -204,7 +218,7 @@ class KeysAw(dict):
|
|
204
218
|
@pulumi.getter
|
205
219
|
def region(self) -> Optional[str]:
|
206
220
|
"""
|
207
|
-
The AWS region where the keys are stored (or will be stored)
|
221
|
+
The AWS region where the keys are stored (or will be stored).
|
208
222
|
"""
|
209
223
|
return pulumi.get(self, "region")
|
210
224
|
|
@@ -273,20 +287,26 @@ class KeysAzure(dict):
|
|
273
287
|
resource: Optional[str] = None,
|
274
288
|
uuid: Optional[str] = None):
|
275
289
|
"""
|
276
|
-
:param str client_id: The client id for credentials to query the Azure APIs
|
277
|
-
:param str client_secret: The client secret for credentials to query the Azure APIs
|
278
|
-
:param str key_name: The Key Vault key to use for encryption and decryption
|
279
|
-
:param str key_type: The type of key to use
|
280
|
-
:param str name: A unique lowercase name that serves as identifying the key
|
281
|
-
:param str tenant_id: The tenant id for the Azure Active Directory organization
|
282
|
-
:param str vault_name: The Key Vault vault to use
|
283
|
-
:param bool allow_generate_key: If no existing key can be found in
|
284
|
-
|
285
|
-
:param bool
|
286
|
-
|
287
|
-
|
288
|
-
|
289
|
-
:param
|
290
|
+
:param str client_id: The client id for credentials to query the Azure APIs.
|
291
|
+
:param str client_secret: The client secret for credentials to query the Azure APIs.
|
292
|
+
:param str key_name: The Key Vault key to use for encryption and decryption.
|
293
|
+
:param str key_type: The type of key to use.
|
294
|
+
:param str name: A unique lowercase name that serves as identifying the key.
|
295
|
+
:param str tenant_id: The tenant id for the Azure Active Directory organization.
|
296
|
+
:param str vault_name: The Key Vault vault to use for encryption and decryption.
|
297
|
+
:param bool allow_generate_key: If no existing key can be found in
|
298
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
299
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through
|
300
|
+
generation or importing a key into the configured backend even
|
301
|
+
if a key is present, if set to `false` those operations are forbidden
|
302
|
+
if a key exists.
|
303
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the
|
304
|
+
configured backend, if `false`, those operations will be forbidden.
|
305
|
+
:param bool any_mount: If `true`, allows usage from any mount point within the
|
306
|
+
namespace.
|
307
|
+
:param str environment: The Azure Cloud environment API endpoints to use.
|
308
|
+
:param str key_bits: The size in bits for an RSA key.
|
309
|
+
:param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
290
310
|
:param str uuid: ID of the managed key read from Vault
|
291
311
|
"""
|
292
312
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -317,7 +337,7 @@ class KeysAzure(dict):
|
|
317
337
|
@pulumi.getter(name="clientId")
|
318
338
|
def client_id(self) -> str:
|
319
339
|
"""
|
320
|
-
The client id for credentials to query the Azure APIs
|
340
|
+
The client id for credentials to query the Azure APIs.
|
321
341
|
"""
|
322
342
|
return pulumi.get(self, "client_id")
|
323
343
|
|
@@ -325,7 +345,7 @@ class KeysAzure(dict):
|
|
325
345
|
@pulumi.getter(name="clientSecret")
|
326
346
|
def client_secret(self) -> str:
|
327
347
|
"""
|
328
|
-
The client secret for credentials to query the Azure APIs
|
348
|
+
The client secret for credentials to query the Azure APIs.
|
329
349
|
"""
|
330
350
|
return pulumi.get(self, "client_secret")
|
331
351
|
|
@@ -333,7 +353,7 @@ class KeysAzure(dict):
|
|
333
353
|
@pulumi.getter(name="keyName")
|
334
354
|
def key_name(self) -> str:
|
335
355
|
"""
|
336
|
-
The Key Vault key to use for encryption and decryption
|
356
|
+
The Key Vault key to use for encryption and decryption.
|
337
357
|
"""
|
338
358
|
return pulumi.get(self, "key_name")
|
339
359
|
|
@@ -341,7 +361,7 @@ class KeysAzure(dict):
|
|
341
361
|
@pulumi.getter(name="keyType")
|
342
362
|
def key_type(self) -> str:
|
343
363
|
"""
|
344
|
-
The type of key to use
|
364
|
+
The type of key to use.
|
345
365
|
"""
|
346
366
|
return pulumi.get(self, "key_type")
|
347
367
|
|
@@ -349,7 +369,7 @@ class KeysAzure(dict):
|
|
349
369
|
@pulumi.getter
|
350
370
|
def name(self) -> str:
|
351
371
|
"""
|
352
|
-
A unique lowercase name that serves as identifying the key
|
372
|
+
A unique lowercase name that serves as identifying the key.
|
353
373
|
"""
|
354
374
|
return pulumi.get(self, "name")
|
355
375
|
|
@@ -357,7 +377,7 @@ class KeysAzure(dict):
|
|
357
377
|
@pulumi.getter(name="tenantId")
|
358
378
|
def tenant_id(self) -> str:
|
359
379
|
"""
|
360
|
-
The tenant id for the Azure Active Directory organization
|
380
|
+
The tenant id for the Azure Active Directory organization.
|
361
381
|
"""
|
362
382
|
return pulumi.get(self, "tenant_id")
|
363
383
|
|
@@ -365,7 +385,7 @@ class KeysAzure(dict):
|
|
365
385
|
@pulumi.getter(name="vaultName")
|
366
386
|
def vault_name(self) -> str:
|
367
387
|
"""
|
368
|
-
The Key Vault vault to use
|
388
|
+
The Key Vault vault to use for encryption and decryption.
|
369
389
|
"""
|
370
390
|
return pulumi.get(self, "vault_name")
|
371
391
|
|
@@ -373,7 +393,8 @@ class KeysAzure(dict):
|
|
373
393
|
@pulumi.getter(name="allowGenerateKey")
|
374
394
|
def allow_generate_key(self) -> Optional[bool]:
|
375
395
|
"""
|
376
|
-
If no existing key can be found in
|
396
|
+
If no existing key can be found in
|
397
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
377
398
|
"""
|
378
399
|
return pulumi.get(self, "allow_generate_key")
|
379
400
|
|
@@ -381,7 +402,10 @@ class KeysAzure(dict):
|
|
381
402
|
@pulumi.getter(name="allowReplaceKey")
|
382
403
|
def allow_replace_key(self) -> Optional[bool]:
|
383
404
|
"""
|
384
|
-
Controls the ability for Vault to replace through
|
405
|
+
Controls the ability for Vault to replace through
|
406
|
+
generation or importing a key into the configured backend even
|
407
|
+
if a key is present, if set to `false` those operations are forbidden
|
408
|
+
if a key exists.
|
385
409
|
"""
|
386
410
|
return pulumi.get(self, "allow_replace_key")
|
387
411
|
|
@@ -389,7 +413,8 @@ class KeysAzure(dict):
|
|
389
413
|
@pulumi.getter(name="allowStoreKey")
|
390
414
|
def allow_store_key(self) -> Optional[bool]:
|
391
415
|
"""
|
392
|
-
Controls the ability for Vault to import a key to the
|
416
|
+
Controls the ability for Vault to import a key to the
|
417
|
+
configured backend, if `false`, those operations will be forbidden.
|
393
418
|
"""
|
394
419
|
return pulumi.get(self, "allow_store_key")
|
395
420
|
|
@@ -397,7 +422,8 @@ class KeysAzure(dict):
|
|
397
422
|
@pulumi.getter(name="anyMount")
|
398
423
|
def any_mount(self) -> Optional[bool]:
|
399
424
|
"""
|
400
|
-
|
425
|
+
If `true`, allows usage from any mount point within the
|
426
|
+
namespace.
|
401
427
|
"""
|
402
428
|
return pulumi.get(self, "any_mount")
|
403
429
|
|
@@ -405,7 +431,7 @@ class KeysAzure(dict):
|
|
405
431
|
@pulumi.getter
|
406
432
|
def environment(self) -> Optional[str]:
|
407
433
|
"""
|
408
|
-
The Azure Cloud environment API endpoints to use
|
434
|
+
The Azure Cloud environment API endpoints to use.
|
409
435
|
"""
|
410
436
|
return pulumi.get(self, "environment")
|
411
437
|
|
@@ -413,7 +439,7 @@ class KeysAzure(dict):
|
|
413
439
|
@pulumi.getter(name="keyBits")
|
414
440
|
def key_bits(self) -> Optional[str]:
|
415
441
|
"""
|
416
|
-
The size in bits for an RSA key.
|
442
|
+
The size in bits for an RSA key.
|
417
443
|
"""
|
418
444
|
return pulumi.get(self, "key_bits")
|
419
445
|
|
@@ -421,7 +447,7 @@ class KeysAzure(dict):
|
|
421
447
|
@pulumi.getter
|
422
448
|
def resource(self) -> Optional[str]:
|
423
449
|
"""
|
424
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
450
|
+
The Azure Key Vault resource's DNS Suffix to connect to.
|
425
451
|
"""
|
426
452
|
return pulumi.get(self, "resource")
|
427
453
|
|
@@ -487,21 +513,32 @@ class KeysPkc(dict):
|
|
487
513
|
token_label: Optional[str] = None,
|
488
514
|
uuid: Optional[str] = None):
|
489
515
|
"""
|
490
|
-
:param str key_id: The id of a PKCS#11 key to use
|
491
|
-
:param str key_label: The label of the key to use
|
492
|
-
:param str library: The name of the kms_library stanza to use from Vault's config
|
493
|
-
|
494
|
-
:param str
|
495
|
-
|
496
|
-
:param
|
497
|
-
:param
|
498
|
-
:param bool
|
499
|
-
|
500
|
-
:param
|
501
|
-
|
502
|
-
|
503
|
-
|
504
|
-
:param
|
516
|
+
:param str key_id: The id of a PKCS#11 key to use.
|
517
|
+
:param str key_label: The label of the key to use.
|
518
|
+
:param str library: The name of the kms_library stanza to use from Vault's config
|
519
|
+
to lookup the local library path.
|
520
|
+
:param str mechanism: The encryption/decryption mechanism to use, specified as a
|
521
|
+
hexadecimal (prefixed by 0x) string.
|
522
|
+
:param str name: A unique lowercase name that serves as identifying the key.
|
523
|
+
:param str pin: The PIN for login.
|
524
|
+
:param bool allow_generate_key: If no existing key can be found in
|
525
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
526
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through
|
527
|
+
generation or importing a key into the configured backend even
|
528
|
+
if a key is present, if set to `false` those operations are forbidden
|
529
|
+
if a key exists.
|
530
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the
|
531
|
+
configured backend, if `false`, those operations will be forbidden.
|
532
|
+
:param bool any_mount: If `true`, allows usage from any mount point within the
|
533
|
+
namespace.
|
534
|
+
:param str curve: The curve to use for an ECDSA key. Used when `key_type`
|
535
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
536
|
+
:param str force_rw_session: Force all operations to open up a read-write session to
|
537
|
+
the HSM.
|
538
|
+
:param str key_bits: The size in bits for an RSA key.
|
539
|
+
:param str slot: The slot number to use, specified as a string in a decimal format
|
540
|
+
(e.g. `2305843009213693953`).
|
541
|
+
:param str token_label: The slot token label to use.
|
505
542
|
:param str uuid: ID of the managed key read from Vault
|
506
543
|
"""
|
507
544
|
pulumi.set(__self__, "key_id", key_id)
|
@@ -535,7 +572,7 @@ class KeysPkc(dict):
|
|
535
572
|
@pulumi.getter(name="keyId")
|
536
573
|
def key_id(self) -> str:
|
537
574
|
"""
|
538
|
-
The id of a PKCS#11 key to use
|
575
|
+
The id of a PKCS#11 key to use.
|
539
576
|
"""
|
540
577
|
return pulumi.get(self, "key_id")
|
541
578
|
|
@@ -543,7 +580,7 @@ class KeysPkc(dict):
|
|
543
580
|
@pulumi.getter(name="keyLabel")
|
544
581
|
def key_label(self) -> str:
|
545
582
|
"""
|
546
|
-
The label of the key to use
|
583
|
+
The label of the key to use.
|
547
584
|
"""
|
548
585
|
return pulumi.get(self, "key_label")
|
549
586
|
|
@@ -551,7 +588,8 @@ class KeysPkc(dict):
|
|
551
588
|
@pulumi.getter
|
552
589
|
def library(self) -> str:
|
553
590
|
"""
|
554
|
-
The name of the kms_library stanza to use from Vault's config
|
591
|
+
The name of the kms_library stanza to use from Vault's config
|
592
|
+
to lookup the local library path.
|
555
593
|
"""
|
556
594
|
return pulumi.get(self, "library")
|
557
595
|
|
@@ -559,7 +597,8 @@ class KeysPkc(dict):
|
|
559
597
|
@pulumi.getter
|
560
598
|
def mechanism(self) -> str:
|
561
599
|
"""
|
562
|
-
The encryption/decryption mechanism to use, specified as a
|
600
|
+
The encryption/decryption mechanism to use, specified as a
|
601
|
+
hexadecimal (prefixed by 0x) string.
|
563
602
|
"""
|
564
603
|
return pulumi.get(self, "mechanism")
|
565
604
|
|
@@ -567,7 +606,7 @@ class KeysPkc(dict):
|
|
567
606
|
@pulumi.getter
|
568
607
|
def name(self) -> str:
|
569
608
|
"""
|
570
|
-
A unique lowercase name that serves as identifying the key
|
609
|
+
A unique lowercase name that serves as identifying the key.
|
571
610
|
"""
|
572
611
|
return pulumi.get(self, "name")
|
573
612
|
|
@@ -575,7 +614,7 @@ class KeysPkc(dict):
|
|
575
614
|
@pulumi.getter
|
576
615
|
def pin(self) -> str:
|
577
616
|
"""
|
578
|
-
The PIN for login
|
617
|
+
The PIN for login.
|
579
618
|
"""
|
580
619
|
return pulumi.get(self, "pin")
|
581
620
|
|
@@ -583,7 +622,8 @@ class KeysPkc(dict):
|
|
583
622
|
@pulumi.getter(name="allowGenerateKey")
|
584
623
|
def allow_generate_key(self) -> Optional[bool]:
|
585
624
|
"""
|
586
|
-
If no existing key can be found in
|
625
|
+
If no existing key can be found in
|
626
|
+
the referenced backend, instructs Vault to generate a key within the backend.
|
587
627
|
"""
|
588
628
|
return pulumi.get(self, "allow_generate_key")
|
589
629
|
|
@@ -591,7 +631,10 @@ class KeysPkc(dict):
|
|
591
631
|
@pulumi.getter(name="allowReplaceKey")
|
592
632
|
def allow_replace_key(self) -> Optional[bool]:
|
593
633
|
"""
|
594
|
-
Controls the ability for Vault to replace through
|
634
|
+
Controls the ability for Vault to replace through
|
635
|
+
generation or importing a key into the configured backend even
|
636
|
+
if a key is present, if set to `false` those operations are forbidden
|
637
|
+
if a key exists.
|
595
638
|
"""
|
596
639
|
return pulumi.get(self, "allow_replace_key")
|
597
640
|
|
@@ -599,7 +642,8 @@ class KeysPkc(dict):
|
|
599
642
|
@pulumi.getter(name="allowStoreKey")
|
600
643
|
def allow_store_key(self) -> Optional[bool]:
|
601
644
|
"""
|
602
|
-
Controls the ability for Vault to import a key to the
|
645
|
+
Controls the ability for Vault to import a key to the
|
646
|
+
configured backend, if `false`, those operations will be forbidden.
|
603
647
|
"""
|
604
648
|
return pulumi.get(self, "allow_store_key")
|
605
649
|
|
@@ -607,7 +651,8 @@ class KeysPkc(dict):
|
|
607
651
|
@pulumi.getter(name="anyMount")
|
608
652
|
def any_mount(self) -> Optional[bool]:
|
609
653
|
"""
|
610
|
-
|
654
|
+
If `true`, allows usage from any mount point within the
|
655
|
+
namespace.
|
611
656
|
"""
|
612
657
|
return pulumi.get(self, "any_mount")
|
613
658
|
|
@@ -615,7 +660,8 @@ class KeysPkc(dict):
|
|
615
660
|
@pulumi.getter
|
616
661
|
def curve(self) -> Optional[str]:
|
617
662
|
"""
|
618
|
-
|
663
|
+
The curve to use for an ECDSA key. Used when `key_type`
|
664
|
+
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
619
665
|
"""
|
620
666
|
return pulumi.get(self, "curve")
|
621
667
|
|
@@ -623,7 +669,8 @@ class KeysPkc(dict):
|
|
623
669
|
@pulumi.getter(name="forceRwSession")
|
624
670
|
def force_rw_session(self) -> Optional[str]:
|
625
671
|
"""
|
626
|
-
Force all operations to open up a read-write session to
|
672
|
+
Force all operations to open up a read-write session to
|
673
|
+
the HSM.
|
627
674
|
"""
|
628
675
|
return pulumi.get(self, "force_rw_session")
|
629
676
|
|
@@ -631,7 +678,7 @@ class KeysPkc(dict):
|
|
631
678
|
@pulumi.getter(name="keyBits")
|
632
679
|
def key_bits(self) -> Optional[str]:
|
633
680
|
"""
|
634
|
-
|
681
|
+
The size in bits for an RSA key.
|
635
682
|
"""
|
636
683
|
return pulumi.get(self, "key_bits")
|
637
684
|
|
@@ -639,7 +686,8 @@ class KeysPkc(dict):
|
|
639
686
|
@pulumi.getter
|
640
687
|
def slot(self) -> Optional[str]:
|
641
688
|
"""
|
642
|
-
The slot number to use, specified as a string in a decimal format
|
689
|
+
The slot number to use, specified as a string in a decimal format
|
690
|
+
(e.g. `2305843009213693953`).
|
643
691
|
"""
|
644
692
|
return pulumi.get(self, "slot")
|
645
693
|
|
@@ -647,7 +695,7 @@ class KeysPkc(dict):
|
|
647
695
|
@pulumi.getter(name="tokenLabel")
|
648
696
|
def token_label(self) -> Optional[str]:
|
649
697
|
"""
|
650
|
-
The slot token label to use
|
698
|
+
The slot token label to use.
|
651
699
|
"""
|
652
700
|
return pulumi.get(self, "token_label")
|
653
701
|
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -328,6 +328,7 @@ class MfaDuo(pulumi.CustomResource):
|
|
328
328
|
|
329
329
|
## Example Usage
|
330
330
|
|
331
|
+
<!--Start PulumiCodeChooser -->
|
331
332
|
```python
|
332
333
|
import pulumi
|
333
334
|
import pulumi_vault as vault
|
@@ -335,13 +336,13 @@ class MfaDuo(pulumi.CustomResource):
|
|
335
336
|
userpass = vault.AuthBackend("userpass",
|
336
337
|
type="userpass",
|
337
338
|
path="userpass")
|
338
|
-
my_duo = vault.MfaDuo("
|
339
|
-
name="my_duo",
|
339
|
+
my_duo = vault.MfaDuo("myDuo",
|
340
340
|
mount_accessor=userpass.accessor,
|
341
341
|
secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
|
342
342
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
343
343
|
api_hostname="api-2b5c39f5.duosecurity.com")
|
344
344
|
```
|
345
|
+
<!--End PulumiCodeChooser -->
|
345
346
|
|
346
347
|
## Import
|
347
348
|
|
@@ -382,6 +383,7 @@ class MfaDuo(pulumi.CustomResource):
|
|
382
383
|
|
383
384
|
## Example Usage
|
384
385
|
|
386
|
+
<!--Start PulumiCodeChooser -->
|
385
387
|
```python
|
386
388
|
import pulumi
|
387
389
|
import pulumi_vault as vault
|
@@ -389,13 +391,13 @@ class MfaDuo(pulumi.CustomResource):
|
|
389
391
|
userpass = vault.AuthBackend("userpass",
|
390
392
|
type="userpass",
|
391
393
|
path="userpass")
|
392
|
-
my_duo = vault.MfaDuo("
|
393
|
-
name="my_duo",
|
394
|
+
my_duo = vault.MfaDuo("myDuo",
|
394
395
|
mount_accessor=userpass.accessor,
|
395
396
|
secret_key="8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
|
396
397
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
397
398
|
api_hostname="api-2b5c39f5.duosecurity.com")
|
398
399
|
```
|
400
|
+
<!--End PulumiCodeChooser -->
|
399
401
|
|
400
402
|
## Import
|
401
403
|
|