pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/_inputs.py
CHANGED
@@ -33,26 +33,19 @@ class KeysAwArgs:
|
|
33
33
|
region: Optional[pulumi.Input[str]] = None,
|
34
34
|
uuid: Optional[pulumi.Input[str]] = None):
|
35
35
|
"""
|
36
|
-
:param pulumi.Input[str] access_key: The AWS access key to use
|
37
|
-
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
38
|
-
:param pulumi.Input[str] key_type: The type of key to use
|
39
|
-
:param pulumi.Input[str] kms_key: An identifier for the key
|
40
|
-
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
41
|
-
:param pulumi.Input[str] secret_key: The AWS
|
42
|
-
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
43
|
-
|
44
|
-
:param pulumi.Input[bool]
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
:param pulumi.Input[
|
49
|
-
configured backend, if `false`, those operations will be forbidden.
|
50
|
-
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
51
|
-
namespace.
|
52
|
-
:param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
|
53
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
54
|
-
:param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
|
55
|
-
:param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
|
36
|
+
:param pulumi.Input[str] access_key: The AWS access key to use
|
37
|
+
:param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
38
|
+
:param pulumi.Input[str] key_type: The type of key to use
|
39
|
+
:param pulumi.Input[str] kms_key: An identifier for the key
|
40
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
41
|
+
:param pulumi.Input[str] secret_key: The AWS secret key to use
|
42
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
43
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
44
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
45
|
+
:param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
46
|
+
:param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
47
|
+
:param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint
|
48
|
+
:param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored)
|
56
49
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
57
50
|
"""
|
58
51
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -82,7 +75,7 @@ class KeysAwArgs:
|
|
82
75
|
@pulumi.getter(name="accessKey")
|
83
76
|
def access_key(self) -> pulumi.Input[str]:
|
84
77
|
"""
|
85
|
-
The AWS access key to use
|
78
|
+
The AWS access key to use
|
86
79
|
"""
|
87
80
|
return pulumi.get(self, "access_key")
|
88
81
|
|
@@ -94,7 +87,7 @@ class KeysAwArgs:
|
|
94
87
|
@pulumi.getter(name="keyBits")
|
95
88
|
def key_bits(self) -> pulumi.Input[str]:
|
96
89
|
"""
|
97
|
-
The size in bits for an RSA key.
|
90
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
98
91
|
"""
|
99
92
|
return pulumi.get(self, "key_bits")
|
100
93
|
|
@@ -106,7 +99,7 @@ class KeysAwArgs:
|
|
106
99
|
@pulumi.getter(name="keyType")
|
107
100
|
def key_type(self) -> pulumi.Input[str]:
|
108
101
|
"""
|
109
|
-
The type of key to use
|
102
|
+
The type of key to use
|
110
103
|
"""
|
111
104
|
return pulumi.get(self, "key_type")
|
112
105
|
|
@@ -118,7 +111,7 @@ class KeysAwArgs:
|
|
118
111
|
@pulumi.getter(name="kmsKey")
|
119
112
|
def kms_key(self) -> pulumi.Input[str]:
|
120
113
|
"""
|
121
|
-
An identifier for the key
|
114
|
+
An identifier for the key
|
122
115
|
"""
|
123
116
|
return pulumi.get(self, "kms_key")
|
124
117
|
|
@@ -130,7 +123,7 @@ class KeysAwArgs:
|
|
130
123
|
@pulumi.getter
|
131
124
|
def name(self) -> pulumi.Input[str]:
|
132
125
|
"""
|
133
|
-
A unique lowercase name that serves as identifying the key
|
126
|
+
A unique lowercase name that serves as identifying the key
|
134
127
|
"""
|
135
128
|
return pulumi.get(self, "name")
|
136
129
|
|
@@ -142,7 +135,7 @@ class KeysAwArgs:
|
|
142
135
|
@pulumi.getter(name="secretKey")
|
143
136
|
def secret_key(self) -> pulumi.Input[str]:
|
144
137
|
"""
|
145
|
-
The AWS
|
138
|
+
The AWS secret key to use
|
146
139
|
"""
|
147
140
|
return pulumi.get(self, "secret_key")
|
148
141
|
|
@@ -154,8 +147,7 @@ class KeysAwArgs:
|
|
154
147
|
@pulumi.getter(name="allowGenerateKey")
|
155
148
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
156
149
|
"""
|
157
|
-
If no existing key can be found in
|
158
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
150
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
159
151
|
"""
|
160
152
|
return pulumi.get(self, "allow_generate_key")
|
161
153
|
|
@@ -167,10 +159,7 @@ class KeysAwArgs:
|
|
167
159
|
@pulumi.getter(name="allowReplaceKey")
|
168
160
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
169
161
|
"""
|
170
|
-
Controls the ability for Vault to replace through
|
171
|
-
generation or importing a key into the configured backend even
|
172
|
-
if a key is present, if set to `false` those operations are forbidden
|
173
|
-
if a key exists.
|
162
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
174
163
|
"""
|
175
164
|
return pulumi.get(self, "allow_replace_key")
|
176
165
|
|
@@ -182,8 +171,7 @@ class KeysAwArgs:
|
|
182
171
|
@pulumi.getter(name="allowStoreKey")
|
183
172
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
184
173
|
"""
|
185
|
-
Controls the ability for Vault to import a key to the
|
186
|
-
configured backend, if `false`, those operations will be forbidden.
|
174
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
187
175
|
"""
|
188
176
|
return pulumi.get(self, "allow_store_key")
|
189
177
|
|
@@ -195,8 +183,7 @@ class KeysAwArgs:
|
|
195
183
|
@pulumi.getter(name="anyMount")
|
196
184
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
197
185
|
"""
|
198
|
-
|
199
|
-
namespace.
|
186
|
+
Allow usage from any mount point within the namespace if 'true'
|
200
187
|
"""
|
201
188
|
return pulumi.get(self, "any_mount")
|
202
189
|
|
@@ -208,8 +195,7 @@ class KeysAwArgs:
|
|
208
195
|
@pulumi.getter
|
209
196
|
def curve(self) -> Optional[pulumi.Input[str]]:
|
210
197
|
"""
|
211
|
-
The curve to use for an ECDSA key. Used when
|
212
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
198
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
213
199
|
"""
|
214
200
|
return pulumi.get(self, "curve")
|
215
201
|
|
@@ -221,7 +207,7 @@ class KeysAwArgs:
|
|
221
207
|
@pulumi.getter
|
222
208
|
def endpoint(self) -> Optional[pulumi.Input[str]]:
|
223
209
|
"""
|
224
|
-
Used to specify a custom AWS endpoint
|
210
|
+
Used to specify a custom AWS endpoint
|
225
211
|
"""
|
226
212
|
return pulumi.get(self, "endpoint")
|
227
213
|
|
@@ -233,7 +219,7 @@ class KeysAwArgs:
|
|
233
219
|
@pulumi.getter
|
234
220
|
def region(self) -> Optional[pulumi.Input[str]]:
|
235
221
|
"""
|
236
|
-
The AWS region where the keys are stored (or will be stored)
|
222
|
+
The AWS region where the keys are stored (or will be stored)
|
237
223
|
"""
|
238
224
|
return pulumi.get(self, "region")
|
239
225
|
|
@@ -273,26 +259,20 @@ class KeysAzureArgs:
|
|
273
259
|
resource: Optional[pulumi.Input[str]] = None,
|
274
260
|
uuid: Optional[pulumi.Input[str]] = None):
|
275
261
|
"""
|
276
|
-
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
|
277
|
-
:param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
|
278
|
-
:param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
|
279
|
-
:param pulumi.Input[str] key_type: The type of key to use
|
280
|
-
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
281
|
-
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
|
282
|
-
:param pulumi.Input[str] vault_name: The Key Vault vault to use for encryption and decryption
|
283
|
-
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
|
284
|
-
|
285
|
-
:param pulumi.Input[bool]
|
286
|
-
|
287
|
-
|
288
|
-
|
289
|
-
:param pulumi.Input[
|
290
|
-
configured backend, if `false`, those operations will be forbidden.
|
291
|
-
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
292
|
-
namespace.
|
293
|
-
:param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
|
294
|
-
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
295
|
-
:param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
262
|
+
:param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
|
263
|
+
:param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
|
264
|
+
:param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
|
265
|
+
:param pulumi.Input[str] key_type: The type of key to use
|
266
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
267
|
+
:param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
|
268
|
+
:param pulumi.Input[str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
269
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
270
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
271
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
272
|
+
:param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
273
|
+
:param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use
|
274
|
+
:param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
275
|
+
:param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to
|
296
276
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
297
277
|
"""
|
298
278
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -323,7 +303,7 @@ class KeysAzureArgs:
|
|
323
303
|
@pulumi.getter(name="clientId")
|
324
304
|
def client_id(self) -> pulumi.Input[str]:
|
325
305
|
"""
|
326
|
-
The client id for credentials to query the Azure APIs
|
306
|
+
The client id for credentials to query the Azure APIs
|
327
307
|
"""
|
328
308
|
return pulumi.get(self, "client_id")
|
329
309
|
|
@@ -335,7 +315,7 @@ class KeysAzureArgs:
|
|
335
315
|
@pulumi.getter(name="clientSecret")
|
336
316
|
def client_secret(self) -> pulumi.Input[str]:
|
337
317
|
"""
|
338
|
-
The client secret for credentials to query the Azure APIs
|
318
|
+
The client secret for credentials to query the Azure APIs
|
339
319
|
"""
|
340
320
|
return pulumi.get(self, "client_secret")
|
341
321
|
|
@@ -347,7 +327,7 @@ class KeysAzureArgs:
|
|
347
327
|
@pulumi.getter(name="keyName")
|
348
328
|
def key_name(self) -> pulumi.Input[str]:
|
349
329
|
"""
|
350
|
-
The Key Vault key to use for encryption and decryption
|
330
|
+
The Key Vault key to use for encryption and decryption
|
351
331
|
"""
|
352
332
|
return pulumi.get(self, "key_name")
|
353
333
|
|
@@ -359,7 +339,7 @@ class KeysAzureArgs:
|
|
359
339
|
@pulumi.getter(name="keyType")
|
360
340
|
def key_type(self) -> pulumi.Input[str]:
|
361
341
|
"""
|
362
|
-
The type of key to use
|
342
|
+
The type of key to use
|
363
343
|
"""
|
364
344
|
return pulumi.get(self, "key_type")
|
365
345
|
|
@@ -371,7 +351,7 @@ class KeysAzureArgs:
|
|
371
351
|
@pulumi.getter
|
372
352
|
def name(self) -> pulumi.Input[str]:
|
373
353
|
"""
|
374
|
-
A unique lowercase name that serves as identifying the key
|
354
|
+
A unique lowercase name that serves as identifying the key
|
375
355
|
"""
|
376
356
|
return pulumi.get(self, "name")
|
377
357
|
|
@@ -383,7 +363,7 @@ class KeysAzureArgs:
|
|
383
363
|
@pulumi.getter(name="tenantId")
|
384
364
|
def tenant_id(self) -> pulumi.Input[str]:
|
385
365
|
"""
|
386
|
-
The tenant id for the Azure Active Directory organization
|
366
|
+
The tenant id for the Azure Active Directory organization
|
387
367
|
"""
|
388
368
|
return pulumi.get(self, "tenant_id")
|
389
369
|
|
@@ -395,7 +375,7 @@ class KeysAzureArgs:
|
|
395
375
|
@pulumi.getter(name="vaultName")
|
396
376
|
def vault_name(self) -> pulumi.Input[str]:
|
397
377
|
"""
|
398
|
-
The Key Vault vault to use for encryption and decryption
|
378
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
399
379
|
"""
|
400
380
|
return pulumi.get(self, "vault_name")
|
401
381
|
|
@@ -407,8 +387,7 @@ class KeysAzureArgs:
|
|
407
387
|
@pulumi.getter(name="allowGenerateKey")
|
408
388
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
409
389
|
"""
|
410
|
-
If no existing key can be found in
|
411
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
390
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
412
391
|
"""
|
413
392
|
return pulumi.get(self, "allow_generate_key")
|
414
393
|
|
@@ -420,10 +399,7 @@ class KeysAzureArgs:
|
|
420
399
|
@pulumi.getter(name="allowReplaceKey")
|
421
400
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
422
401
|
"""
|
423
|
-
Controls the ability for Vault to replace through
|
424
|
-
generation or importing a key into the configured backend even
|
425
|
-
if a key is present, if set to `false` those operations are forbidden
|
426
|
-
if a key exists.
|
402
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
427
403
|
"""
|
428
404
|
return pulumi.get(self, "allow_replace_key")
|
429
405
|
|
@@ -435,8 +411,7 @@ class KeysAzureArgs:
|
|
435
411
|
@pulumi.getter(name="allowStoreKey")
|
436
412
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
437
413
|
"""
|
438
|
-
Controls the ability for Vault to import a key to the
|
439
|
-
configured backend, if `false`, those operations will be forbidden.
|
414
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
440
415
|
"""
|
441
416
|
return pulumi.get(self, "allow_store_key")
|
442
417
|
|
@@ -448,8 +423,7 @@ class KeysAzureArgs:
|
|
448
423
|
@pulumi.getter(name="anyMount")
|
449
424
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
450
425
|
"""
|
451
|
-
|
452
|
-
namespace.
|
426
|
+
Allow usage from any mount point within the namespace if 'true'
|
453
427
|
"""
|
454
428
|
return pulumi.get(self, "any_mount")
|
455
429
|
|
@@ -461,7 +435,7 @@ class KeysAzureArgs:
|
|
461
435
|
@pulumi.getter
|
462
436
|
def environment(self) -> Optional[pulumi.Input[str]]:
|
463
437
|
"""
|
464
|
-
The Azure Cloud environment API endpoints to use
|
438
|
+
The Azure Cloud environment API endpoints to use
|
465
439
|
"""
|
466
440
|
return pulumi.get(self, "environment")
|
467
441
|
|
@@ -473,7 +447,7 @@ class KeysAzureArgs:
|
|
473
447
|
@pulumi.getter(name="keyBits")
|
474
448
|
def key_bits(self) -> Optional[pulumi.Input[str]]:
|
475
449
|
"""
|
476
|
-
The size in bits for an RSA key.
|
450
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
477
451
|
"""
|
478
452
|
return pulumi.get(self, "key_bits")
|
479
453
|
|
@@ -485,7 +459,7 @@ class KeysAzureArgs:
|
|
485
459
|
@pulumi.getter
|
486
460
|
def resource(self) -> Optional[pulumi.Input[str]]:
|
487
461
|
"""
|
488
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
462
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
489
463
|
"""
|
490
464
|
return pulumi.get(self, "resource")
|
491
465
|
|
@@ -526,32 +500,21 @@ class KeysPkcArgs:
|
|
526
500
|
token_label: Optional[pulumi.Input[str]] = None,
|
527
501
|
uuid: Optional[pulumi.Input[str]] = None):
|
528
502
|
"""
|
529
|
-
:param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
|
530
|
-
:param pulumi.Input[str] key_label: The label of the key to use
|
531
|
-
:param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
|
532
|
-
|
533
|
-
:param pulumi.Input[str]
|
534
|
-
|
535
|
-
:param pulumi.Input[
|
536
|
-
:param pulumi.Input[
|
537
|
-
:param pulumi.Input[bool]
|
538
|
-
|
539
|
-
:param pulumi.Input[
|
540
|
-
|
541
|
-
|
542
|
-
|
543
|
-
:param pulumi.Input[
|
544
|
-
configured backend, if `false`, those operations will be forbidden.
|
545
|
-
:param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
|
546
|
-
namespace.
|
547
|
-
:param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
|
548
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
549
|
-
:param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to
|
550
|
-
the HSM.
|
551
|
-
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
552
|
-
:param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
|
553
|
-
(e.g. `2305843009213693953`).
|
554
|
-
:param pulumi.Input[str] token_label: The slot token label to use.
|
503
|
+
:param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
|
504
|
+
:param pulumi.Input[str] key_label: The label of the key to use
|
505
|
+
:param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
506
|
+
:param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
507
|
+
:param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
|
508
|
+
:param pulumi.Input[str] pin: The PIN for login
|
509
|
+
:param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
510
|
+
:param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
511
|
+
:param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
512
|
+
:param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
513
|
+
:param pulumi.Input[str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
514
|
+
:param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to the HSM
|
515
|
+
:param pulumi.Input[str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
516
|
+
:param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
517
|
+
:param pulumi.Input[str] token_label: The slot token label to use
|
555
518
|
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
556
519
|
"""
|
557
520
|
pulumi.set(__self__, "key_id", key_id)
|
@@ -585,7 +548,7 @@ class KeysPkcArgs:
|
|
585
548
|
@pulumi.getter(name="keyId")
|
586
549
|
def key_id(self) -> pulumi.Input[str]:
|
587
550
|
"""
|
588
|
-
The id of a PKCS#11 key to use
|
551
|
+
The id of a PKCS#11 key to use
|
589
552
|
"""
|
590
553
|
return pulumi.get(self, "key_id")
|
591
554
|
|
@@ -597,7 +560,7 @@ class KeysPkcArgs:
|
|
597
560
|
@pulumi.getter(name="keyLabel")
|
598
561
|
def key_label(self) -> pulumi.Input[str]:
|
599
562
|
"""
|
600
|
-
The label of the key to use
|
563
|
+
The label of the key to use
|
601
564
|
"""
|
602
565
|
return pulumi.get(self, "key_label")
|
603
566
|
|
@@ -609,8 +572,7 @@ class KeysPkcArgs:
|
|
609
572
|
@pulumi.getter
|
610
573
|
def library(self) -> pulumi.Input[str]:
|
611
574
|
"""
|
612
|
-
The name of the kms_library stanza to use from Vault's config
|
613
|
-
to lookup the local library path.
|
575
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
614
576
|
"""
|
615
577
|
return pulumi.get(self, "library")
|
616
578
|
|
@@ -622,8 +584,7 @@ class KeysPkcArgs:
|
|
622
584
|
@pulumi.getter
|
623
585
|
def mechanism(self) -> pulumi.Input[str]:
|
624
586
|
"""
|
625
|
-
The encryption/decryption mechanism to use, specified as a
|
626
|
-
hexadecimal (prefixed by 0x) string.
|
587
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
627
588
|
"""
|
628
589
|
return pulumi.get(self, "mechanism")
|
629
590
|
|
@@ -635,7 +596,7 @@ class KeysPkcArgs:
|
|
635
596
|
@pulumi.getter
|
636
597
|
def name(self) -> pulumi.Input[str]:
|
637
598
|
"""
|
638
|
-
A unique lowercase name that serves as identifying the key
|
599
|
+
A unique lowercase name that serves as identifying the key
|
639
600
|
"""
|
640
601
|
return pulumi.get(self, "name")
|
641
602
|
|
@@ -647,7 +608,7 @@ class KeysPkcArgs:
|
|
647
608
|
@pulumi.getter
|
648
609
|
def pin(self) -> pulumi.Input[str]:
|
649
610
|
"""
|
650
|
-
The PIN for login
|
611
|
+
The PIN for login
|
651
612
|
"""
|
652
613
|
return pulumi.get(self, "pin")
|
653
614
|
|
@@ -659,8 +620,7 @@ class KeysPkcArgs:
|
|
659
620
|
@pulumi.getter(name="allowGenerateKey")
|
660
621
|
def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
|
661
622
|
"""
|
662
|
-
If no existing key can be found in
|
663
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
623
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
664
624
|
"""
|
665
625
|
return pulumi.get(self, "allow_generate_key")
|
666
626
|
|
@@ -672,10 +632,7 @@ class KeysPkcArgs:
|
|
672
632
|
@pulumi.getter(name="allowReplaceKey")
|
673
633
|
def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
|
674
634
|
"""
|
675
|
-
Controls the ability for Vault to replace through
|
676
|
-
generation or importing a key into the configured backend even
|
677
|
-
if a key is present, if set to `false` those operations are forbidden
|
678
|
-
if a key exists.
|
635
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
679
636
|
"""
|
680
637
|
return pulumi.get(self, "allow_replace_key")
|
681
638
|
|
@@ -687,8 +644,7 @@ class KeysPkcArgs:
|
|
687
644
|
@pulumi.getter(name="allowStoreKey")
|
688
645
|
def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
|
689
646
|
"""
|
690
|
-
Controls the ability for Vault to import a key to the
|
691
|
-
configured backend, if `false`, those operations will be forbidden.
|
647
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
692
648
|
"""
|
693
649
|
return pulumi.get(self, "allow_store_key")
|
694
650
|
|
@@ -700,8 +656,7 @@ class KeysPkcArgs:
|
|
700
656
|
@pulumi.getter(name="anyMount")
|
701
657
|
def any_mount(self) -> Optional[pulumi.Input[bool]]:
|
702
658
|
"""
|
703
|
-
|
704
|
-
namespace.
|
659
|
+
Allow usage from any mount point within the namespace if 'true'
|
705
660
|
"""
|
706
661
|
return pulumi.get(self, "any_mount")
|
707
662
|
|
@@ -713,8 +668,7 @@ class KeysPkcArgs:
|
|
713
668
|
@pulumi.getter
|
714
669
|
def curve(self) -> Optional[pulumi.Input[str]]:
|
715
670
|
"""
|
716
|
-
|
717
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
671
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
718
672
|
"""
|
719
673
|
return pulumi.get(self, "curve")
|
720
674
|
|
@@ -726,8 +680,7 @@ class KeysPkcArgs:
|
|
726
680
|
@pulumi.getter(name="forceRwSession")
|
727
681
|
def force_rw_session(self) -> Optional[pulumi.Input[str]]:
|
728
682
|
"""
|
729
|
-
Force all operations to open up a read-write session to
|
730
|
-
the HSM.
|
683
|
+
Force all operations to open up a read-write session to the HSM
|
731
684
|
"""
|
732
685
|
return pulumi.get(self, "force_rw_session")
|
733
686
|
|
@@ -739,7 +692,7 @@ class KeysPkcArgs:
|
|
739
692
|
@pulumi.getter(name="keyBits")
|
740
693
|
def key_bits(self) -> Optional[pulumi.Input[str]]:
|
741
694
|
"""
|
742
|
-
|
695
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
743
696
|
"""
|
744
697
|
return pulumi.get(self, "key_bits")
|
745
698
|
|
@@ -751,8 +704,7 @@ class KeysPkcArgs:
|
|
751
704
|
@pulumi.getter
|
752
705
|
def slot(self) -> Optional[pulumi.Input[str]]:
|
753
706
|
"""
|
754
|
-
The slot number to use, specified as a string in a decimal format
|
755
|
-
(e.g. `2305843009213693953`).
|
707
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
756
708
|
"""
|
757
709
|
return pulumi.get(self, "slot")
|
758
710
|
|
@@ -764,7 +716,7 @@ class KeysPkcArgs:
|
|
764
716
|
@pulumi.getter(name="tokenLabel")
|
765
717
|
def token_label(self) -> Optional[pulumi.Input[str]]:
|
766
718
|
"""
|
767
|
-
The slot token label to use
|
719
|
+
The slot token label to use
|
768
720
|
"""
|
769
721
|
return pulumi.get(self, "token_label")
|
770
722
|
|
pulumi_vault/managed/keys.py
CHANGED
@@ -24,10 +24,7 @@ class KeysArgs:
|
|
24
24
|
The set of arguments for constructing a Keys resource.
|
25
25
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
|
26
26
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
|
27
|
-
:param pulumi.Input[str] namespace:
|
28
|
-
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured namespace.
|
30
|
-
*Available only for Vault Enterprise*.
|
27
|
+
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
31
28
|
:param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
|
32
29
|
"""
|
33
30
|
if aws is not None:
|
@@ -67,10 +64,7 @@ class KeysArgs:
|
|
67
64
|
@pulumi.getter
|
68
65
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
69
66
|
"""
|
70
|
-
|
71
|
-
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured namespace.
|
73
|
-
*Available only for Vault Enterprise*.
|
67
|
+
Target namespace. (requires Enterprise)
|
74
68
|
"""
|
75
69
|
return pulumi.get(self, "namespace")
|
76
70
|
|
@@ -102,10 +96,7 @@ class _KeysState:
|
|
102
96
|
Input properties used for looking up and filtering Keys resources.
|
103
97
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
|
104
98
|
:param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
|
105
|
-
:param pulumi.Input[str] namespace:
|
106
|
-
The value should not contain leading or trailing forward slashes.
|
107
|
-
The `namespace` is always relative to the provider's configured namespace.
|
108
|
-
*Available only for Vault Enterprise*.
|
99
|
+
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
109
100
|
:param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
|
110
101
|
"""
|
111
102
|
if aws is not None:
|
@@ -145,10 +136,7 @@ class _KeysState:
|
|
145
136
|
@pulumi.getter
|
146
137
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
147
138
|
"""
|
148
|
-
|
149
|
-
The value should not contain leading or trailing forward slashes.
|
150
|
-
The `namespace` is always relative to the provider's configured namespace.
|
151
|
-
*Available only for Vault Enterprise*.
|
139
|
+
Target namespace. (requires Enterprise)
|
152
140
|
"""
|
153
141
|
return pulumi.get(self, "namespace")
|
154
142
|
|
@@ -196,10 +184,7 @@ class Keys(pulumi.CustomResource):
|
|
196
184
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
197
185
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
|
198
186
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
|
199
|
-
:param pulumi.Input[str] namespace:
|
200
|
-
The value should not contain leading or trailing forward slashes.
|
201
|
-
The `namespace` is always relative to the provider's configured namespace.
|
202
|
-
*Available only for Vault Enterprise*.
|
187
|
+
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
203
188
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
|
204
189
|
"""
|
205
190
|
...
|
@@ -276,10 +261,7 @@ class Keys(pulumi.CustomResource):
|
|
276
261
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
277
262
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
|
278
263
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
|
279
|
-
:param pulumi.Input[str] namespace:
|
280
|
-
The value should not contain leading or trailing forward slashes.
|
281
|
-
The `namespace` is always relative to the provider's configured namespace.
|
282
|
-
*Available only for Vault Enterprise*.
|
264
|
+
:param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
|
283
265
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
|
284
266
|
"""
|
285
267
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -312,10 +294,7 @@ class Keys(pulumi.CustomResource):
|
|
312
294
|
@pulumi.getter
|
313
295
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
314
296
|
"""
|
315
|
-
|
316
|
-
The value should not contain leading or trailing forward slashes.
|
317
|
-
The `namespace` is always relative to the provider's configured namespace.
|
318
|
-
*Available only for Vault Enterprise*.
|
297
|
+
Target namespace. (requires Enterprise)
|
319
298
|
"""
|
320
299
|
return pulumi.get(self, "namespace")
|
321
300
|
|