pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -33,26 +33,19 @@ class KeysAwArgs:
33
33
  region: Optional[pulumi.Input[str]] = None,
34
34
  uuid: Optional[pulumi.Input[str]] = None):
35
35
  """
36
- :param pulumi.Input[str] access_key: The AWS access key to use.
37
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
38
- :param pulumi.Input[str] key_type: The type of key to use.
39
- :param pulumi.Input[str] kms_key: An identifier for the key.
40
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
41
- :param pulumi.Input[str] secret_key: The AWS access key to use.
42
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
43
- the referenced backend, instructs Vault to generate a key within the backend.
44
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
45
- generation or importing a key into the configured backend even
46
- if a key is present, if set to `false` those operations are forbidden
47
- if a key exists.
48
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
49
- configured backend, if `false`, those operations will be forbidden.
50
- :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
51
- namespace.
52
- :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
53
- is `ECDSA`. Required if `allow_generate_key` is `true`.
54
- :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
55
- :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
36
+ :param pulumi.Input[str] access_key: The AWS access key to use
37
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
38
+ :param pulumi.Input[str] key_type: The type of key to use
39
+ :param pulumi.Input[str] kms_key: An identifier for the key
40
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
41
+ :param pulumi.Input[str] secret_key: The AWS secret key to use
42
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
43
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
44
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
45
+ :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
46
+ :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
47
+ :param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint
48
+ :param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored)
56
49
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
57
50
  """
58
51
  pulumi.set(__self__, "access_key", access_key)
@@ -82,7 +75,7 @@ class KeysAwArgs:
82
75
  @pulumi.getter(name="accessKey")
83
76
  def access_key(self) -> pulumi.Input[str]:
84
77
  """
85
- The AWS access key to use.
78
+ The AWS access key to use
86
79
  """
87
80
  return pulumi.get(self, "access_key")
88
81
 
@@ -94,7 +87,7 @@ class KeysAwArgs:
94
87
  @pulumi.getter(name="keyBits")
95
88
  def key_bits(self) -> pulumi.Input[str]:
96
89
  """
97
- The size in bits for an RSA key.
90
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
98
91
  """
99
92
  return pulumi.get(self, "key_bits")
100
93
 
@@ -106,7 +99,7 @@ class KeysAwArgs:
106
99
  @pulumi.getter(name="keyType")
107
100
  def key_type(self) -> pulumi.Input[str]:
108
101
  """
109
- The type of key to use.
102
+ The type of key to use
110
103
  """
111
104
  return pulumi.get(self, "key_type")
112
105
 
@@ -118,7 +111,7 @@ class KeysAwArgs:
118
111
  @pulumi.getter(name="kmsKey")
119
112
  def kms_key(self) -> pulumi.Input[str]:
120
113
  """
121
- An identifier for the key.
114
+ An identifier for the key
122
115
  """
123
116
  return pulumi.get(self, "kms_key")
124
117
 
@@ -130,7 +123,7 @@ class KeysAwArgs:
130
123
  @pulumi.getter
131
124
  def name(self) -> pulumi.Input[str]:
132
125
  """
133
- A unique lowercase name that serves as identifying the key.
126
+ A unique lowercase name that serves as identifying the key
134
127
  """
135
128
  return pulumi.get(self, "name")
136
129
 
@@ -142,7 +135,7 @@ class KeysAwArgs:
142
135
  @pulumi.getter(name="secretKey")
143
136
  def secret_key(self) -> pulumi.Input[str]:
144
137
  """
145
- The AWS access key to use.
138
+ The AWS secret key to use
146
139
  """
147
140
  return pulumi.get(self, "secret_key")
148
141
 
@@ -154,8 +147,7 @@ class KeysAwArgs:
154
147
  @pulumi.getter(name="allowGenerateKey")
155
148
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
156
149
  """
157
- If no existing key can be found in
158
- the referenced backend, instructs Vault to generate a key within the backend.
150
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
159
151
  """
160
152
  return pulumi.get(self, "allow_generate_key")
161
153
 
@@ -167,10 +159,7 @@ class KeysAwArgs:
167
159
  @pulumi.getter(name="allowReplaceKey")
168
160
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
169
161
  """
170
- Controls the ability for Vault to replace through
171
- generation or importing a key into the configured backend even
172
- if a key is present, if set to `false` those operations are forbidden
173
- if a key exists.
162
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
174
163
  """
175
164
  return pulumi.get(self, "allow_replace_key")
176
165
 
@@ -182,8 +171,7 @@ class KeysAwArgs:
182
171
  @pulumi.getter(name="allowStoreKey")
183
172
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
184
173
  """
185
- Controls the ability for Vault to import a key to the
186
- configured backend, if `false`, those operations will be forbidden.
174
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
187
175
  """
188
176
  return pulumi.get(self, "allow_store_key")
189
177
 
@@ -195,8 +183,7 @@ class KeysAwArgs:
195
183
  @pulumi.getter(name="anyMount")
196
184
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
197
185
  """
198
- If `true`, allows usage from any mount point within the
199
- namespace.
186
+ Allow usage from any mount point within the namespace if 'true'
200
187
  """
201
188
  return pulumi.get(self, "any_mount")
202
189
 
@@ -208,8 +195,7 @@ class KeysAwArgs:
208
195
  @pulumi.getter
209
196
  def curve(self) -> Optional[pulumi.Input[str]]:
210
197
  """
211
- The curve to use for an ECDSA key. Used when `key_type`
212
- is `ECDSA`. Required if `allow_generate_key` is `true`.
198
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
213
199
  """
214
200
  return pulumi.get(self, "curve")
215
201
 
@@ -221,7 +207,7 @@ class KeysAwArgs:
221
207
  @pulumi.getter
222
208
  def endpoint(self) -> Optional[pulumi.Input[str]]:
223
209
  """
224
- Used to specify a custom AWS endpoint.
210
+ Used to specify a custom AWS endpoint
225
211
  """
226
212
  return pulumi.get(self, "endpoint")
227
213
 
@@ -233,7 +219,7 @@ class KeysAwArgs:
233
219
  @pulumi.getter
234
220
  def region(self) -> Optional[pulumi.Input[str]]:
235
221
  """
236
- The AWS region where the keys are stored (or will be stored).
222
+ The AWS region where the keys are stored (or will be stored)
237
223
  """
238
224
  return pulumi.get(self, "region")
239
225
 
@@ -273,26 +259,20 @@ class KeysAzureArgs:
273
259
  resource: Optional[pulumi.Input[str]] = None,
274
260
  uuid: Optional[pulumi.Input[str]] = None):
275
261
  """
276
- :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs.
277
- :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs.
278
- :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption.
279
- :param pulumi.Input[str] key_type: The type of key to use.
280
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
281
- :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization.
282
- :param pulumi.Input[str] vault_name: The Key Vault vault to use for encryption and decryption.
283
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
284
- the referenced backend, instructs Vault to generate a key within the backend.
285
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
286
- generation or importing a key into the configured backend even
287
- if a key is present, if set to `false` those operations are forbidden
288
- if a key exists.
289
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
290
- configured backend, if `false`, those operations will be forbidden.
291
- :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
292
- namespace.
293
- :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
294
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
295
- :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
262
+ :param pulumi.Input[str] client_id: The client id for credentials to query the Azure APIs
263
+ :param pulumi.Input[str] client_secret: The client secret for credentials to query the Azure APIs
264
+ :param pulumi.Input[str] key_name: The Key Vault key to use for encryption and decryption
265
+ :param pulumi.Input[str] key_type: The type of key to use
266
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
267
+ :param pulumi.Input[str] tenant_id: The tenant id for the Azure Active Directory organization
268
+ :param pulumi.Input[str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
269
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
270
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
271
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
272
+ :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
273
+ :param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use
274
+ :param pulumi.Input[str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
275
+ :param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to
296
276
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
297
277
  """
298
278
  pulumi.set(__self__, "client_id", client_id)
@@ -323,7 +303,7 @@ class KeysAzureArgs:
323
303
  @pulumi.getter(name="clientId")
324
304
  def client_id(self) -> pulumi.Input[str]:
325
305
  """
326
- The client id for credentials to query the Azure APIs.
306
+ The client id for credentials to query the Azure APIs
327
307
  """
328
308
  return pulumi.get(self, "client_id")
329
309
 
@@ -335,7 +315,7 @@ class KeysAzureArgs:
335
315
  @pulumi.getter(name="clientSecret")
336
316
  def client_secret(self) -> pulumi.Input[str]:
337
317
  """
338
- The client secret for credentials to query the Azure APIs.
318
+ The client secret for credentials to query the Azure APIs
339
319
  """
340
320
  return pulumi.get(self, "client_secret")
341
321
 
@@ -347,7 +327,7 @@ class KeysAzureArgs:
347
327
  @pulumi.getter(name="keyName")
348
328
  def key_name(self) -> pulumi.Input[str]:
349
329
  """
350
- The Key Vault key to use for encryption and decryption.
330
+ The Key Vault key to use for encryption and decryption
351
331
  """
352
332
  return pulumi.get(self, "key_name")
353
333
 
@@ -359,7 +339,7 @@ class KeysAzureArgs:
359
339
  @pulumi.getter(name="keyType")
360
340
  def key_type(self) -> pulumi.Input[str]:
361
341
  """
362
- The type of key to use.
342
+ The type of key to use
363
343
  """
364
344
  return pulumi.get(self, "key_type")
365
345
 
@@ -371,7 +351,7 @@ class KeysAzureArgs:
371
351
  @pulumi.getter
372
352
  def name(self) -> pulumi.Input[str]:
373
353
  """
374
- A unique lowercase name that serves as identifying the key.
354
+ A unique lowercase name that serves as identifying the key
375
355
  """
376
356
  return pulumi.get(self, "name")
377
357
 
@@ -383,7 +363,7 @@ class KeysAzureArgs:
383
363
  @pulumi.getter(name="tenantId")
384
364
  def tenant_id(self) -> pulumi.Input[str]:
385
365
  """
386
- The tenant id for the Azure Active Directory organization.
366
+ The tenant id for the Azure Active Directory organization
387
367
  """
388
368
  return pulumi.get(self, "tenant_id")
389
369
 
@@ -395,7 +375,7 @@ class KeysAzureArgs:
395
375
  @pulumi.getter(name="vaultName")
396
376
  def vault_name(self) -> pulumi.Input[str]:
397
377
  """
398
- The Key Vault vault to use for encryption and decryption.
378
+ The Key Vault vault to use the encryption keys for encryption and decryption
399
379
  """
400
380
  return pulumi.get(self, "vault_name")
401
381
 
@@ -407,8 +387,7 @@ class KeysAzureArgs:
407
387
  @pulumi.getter(name="allowGenerateKey")
408
388
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
409
389
  """
410
- If no existing key can be found in
411
- the referenced backend, instructs Vault to generate a key within the backend.
390
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
412
391
  """
413
392
  return pulumi.get(self, "allow_generate_key")
414
393
 
@@ -420,10 +399,7 @@ class KeysAzureArgs:
420
399
  @pulumi.getter(name="allowReplaceKey")
421
400
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
422
401
  """
423
- Controls the ability for Vault to replace through
424
- generation or importing a key into the configured backend even
425
- if a key is present, if set to `false` those operations are forbidden
426
- if a key exists.
402
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
427
403
  """
428
404
  return pulumi.get(self, "allow_replace_key")
429
405
 
@@ -435,8 +411,7 @@ class KeysAzureArgs:
435
411
  @pulumi.getter(name="allowStoreKey")
436
412
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
437
413
  """
438
- Controls the ability for Vault to import a key to the
439
- configured backend, if `false`, those operations will be forbidden.
414
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
440
415
  """
441
416
  return pulumi.get(self, "allow_store_key")
442
417
 
@@ -448,8 +423,7 @@ class KeysAzureArgs:
448
423
  @pulumi.getter(name="anyMount")
449
424
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
450
425
  """
451
- If `true`, allows usage from any mount point within the
452
- namespace.
426
+ Allow usage from any mount point within the namespace if 'true'
453
427
  """
454
428
  return pulumi.get(self, "any_mount")
455
429
 
@@ -461,7 +435,7 @@ class KeysAzureArgs:
461
435
  @pulumi.getter
462
436
  def environment(self) -> Optional[pulumi.Input[str]]:
463
437
  """
464
- The Azure Cloud environment API endpoints to use.
438
+ The Azure Cloud environment API endpoints to use
465
439
  """
466
440
  return pulumi.get(self, "environment")
467
441
 
@@ -473,7 +447,7 @@ class KeysAzureArgs:
473
447
  @pulumi.getter(name="keyBits")
474
448
  def key_bits(self) -> Optional[pulumi.Input[str]]:
475
449
  """
476
- The size in bits for an RSA key.
450
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
477
451
  """
478
452
  return pulumi.get(self, "key_bits")
479
453
 
@@ -485,7 +459,7 @@ class KeysAzureArgs:
485
459
  @pulumi.getter
486
460
  def resource(self) -> Optional[pulumi.Input[str]]:
487
461
  """
488
- The Azure Key Vault resource's DNS Suffix to connect to.
462
+ The Azure Key Vault resource's DNS Suffix to connect to
489
463
  """
490
464
  return pulumi.get(self, "resource")
491
465
 
@@ -526,32 +500,21 @@ class KeysPkcArgs:
526
500
  token_label: Optional[pulumi.Input[str]] = None,
527
501
  uuid: Optional[pulumi.Input[str]] = None):
528
502
  """
529
- :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use.
530
- :param pulumi.Input[str] key_label: The label of the key to use.
531
- :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config
532
- to lookup the local library path.
533
- :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a
534
- hexadecimal (prefixed by 0x) string.
535
- :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key.
536
- :param pulumi.Input[str] pin: The PIN for login.
537
- :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in
538
- the referenced backend, instructs Vault to generate a key within the backend.
539
- :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through
540
- generation or importing a key into the configured backend even
541
- if a key is present, if set to `false` those operations are forbidden
542
- if a key exists.
543
- :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the
544
- configured backend, if `false`, those operations will be forbidden.
545
- :param pulumi.Input[bool] any_mount: If `true`, allows usage from any mount point within the
546
- namespace.
547
- :param pulumi.Input[str] curve: The curve to use for an ECDSA key. Used when `key_type`
548
- is `ECDSA`. Required if `allow_generate_key` is `true`.
549
- :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to
550
- the HSM.
551
- :param pulumi.Input[str] key_bits: The size in bits for an RSA key.
552
- :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
553
- (e.g. `2305843009213693953`).
554
- :param pulumi.Input[str] token_label: The slot token label to use.
503
+ :param pulumi.Input[str] key_id: The id of a PKCS#11 key to use
504
+ :param pulumi.Input[str] key_label: The label of the key to use
505
+ :param pulumi.Input[str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
506
+ :param pulumi.Input[str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
507
+ :param pulumi.Input[str] name: A unique lowercase name that serves as identifying the key
508
+ :param pulumi.Input[str] pin: The PIN for login
509
+ :param pulumi.Input[bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
510
+ :param pulumi.Input[bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
511
+ :param pulumi.Input[bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
512
+ :param pulumi.Input[bool] any_mount: Allow usage from any mount point within the namespace if 'true'
513
+ :param pulumi.Input[str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
514
+ :param pulumi.Input[str] force_rw_session: Force all operations to open up a read-write session to the HSM
515
+ :param pulumi.Input[str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
516
+ :param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
517
+ :param pulumi.Input[str] token_label: The slot token label to use
555
518
  :param pulumi.Input[str] uuid: ID of the managed key read from Vault
556
519
  """
557
520
  pulumi.set(__self__, "key_id", key_id)
@@ -585,7 +548,7 @@ class KeysPkcArgs:
585
548
  @pulumi.getter(name="keyId")
586
549
  def key_id(self) -> pulumi.Input[str]:
587
550
  """
588
- The id of a PKCS#11 key to use.
551
+ The id of a PKCS#11 key to use
589
552
  """
590
553
  return pulumi.get(self, "key_id")
591
554
 
@@ -597,7 +560,7 @@ class KeysPkcArgs:
597
560
  @pulumi.getter(name="keyLabel")
598
561
  def key_label(self) -> pulumi.Input[str]:
599
562
  """
600
- The label of the key to use.
563
+ The label of the key to use
601
564
  """
602
565
  return pulumi.get(self, "key_label")
603
566
 
@@ -609,8 +572,7 @@ class KeysPkcArgs:
609
572
  @pulumi.getter
610
573
  def library(self) -> pulumi.Input[str]:
611
574
  """
612
- The name of the kms_library stanza to use from Vault's config
613
- to lookup the local library path.
575
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
614
576
  """
615
577
  return pulumi.get(self, "library")
616
578
 
@@ -622,8 +584,7 @@ class KeysPkcArgs:
622
584
  @pulumi.getter
623
585
  def mechanism(self) -> pulumi.Input[str]:
624
586
  """
625
- The encryption/decryption mechanism to use, specified as a
626
- hexadecimal (prefixed by 0x) string.
587
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
627
588
  """
628
589
  return pulumi.get(self, "mechanism")
629
590
 
@@ -635,7 +596,7 @@ class KeysPkcArgs:
635
596
  @pulumi.getter
636
597
  def name(self) -> pulumi.Input[str]:
637
598
  """
638
- A unique lowercase name that serves as identifying the key.
599
+ A unique lowercase name that serves as identifying the key
639
600
  """
640
601
  return pulumi.get(self, "name")
641
602
 
@@ -647,7 +608,7 @@ class KeysPkcArgs:
647
608
  @pulumi.getter
648
609
  def pin(self) -> pulumi.Input[str]:
649
610
  """
650
- The PIN for login.
611
+ The PIN for login
651
612
  """
652
613
  return pulumi.get(self, "pin")
653
614
 
@@ -659,8 +620,7 @@ class KeysPkcArgs:
659
620
  @pulumi.getter(name="allowGenerateKey")
660
621
  def allow_generate_key(self) -> Optional[pulumi.Input[bool]]:
661
622
  """
662
- If no existing key can be found in
663
- the referenced backend, instructs Vault to generate a key within the backend.
623
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
664
624
  """
665
625
  return pulumi.get(self, "allow_generate_key")
666
626
 
@@ -672,10 +632,7 @@ class KeysPkcArgs:
672
632
  @pulumi.getter(name="allowReplaceKey")
673
633
  def allow_replace_key(self) -> Optional[pulumi.Input[bool]]:
674
634
  """
675
- Controls the ability for Vault to replace through
676
- generation or importing a key into the configured backend even
677
- if a key is present, if set to `false` those operations are forbidden
678
- if a key exists.
635
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
679
636
  """
680
637
  return pulumi.get(self, "allow_replace_key")
681
638
 
@@ -687,8 +644,7 @@ class KeysPkcArgs:
687
644
  @pulumi.getter(name="allowStoreKey")
688
645
  def allow_store_key(self) -> Optional[pulumi.Input[bool]]:
689
646
  """
690
- Controls the ability for Vault to import a key to the
691
- configured backend, if `false`, those operations will be forbidden.
647
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
692
648
  """
693
649
  return pulumi.get(self, "allow_store_key")
694
650
 
@@ -700,8 +656,7 @@ class KeysPkcArgs:
700
656
  @pulumi.getter(name="anyMount")
701
657
  def any_mount(self) -> Optional[pulumi.Input[bool]]:
702
658
  """
703
- If `true`, allows usage from any mount point within the
704
- namespace.
659
+ Allow usage from any mount point within the namespace if 'true'
705
660
  """
706
661
  return pulumi.get(self, "any_mount")
707
662
 
@@ -713,8 +668,7 @@ class KeysPkcArgs:
713
668
  @pulumi.getter
714
669
  def curve(self) -> Optional[pulumi.Input[str]]:
715
670
  """
716
- The curve to use for an ECDSA key. Used when `key_type`
717
- is `ECDSA`. Required if `allow_generate_key` is `true`.
671
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
718
672
  """
719
673
  return pulumi.get(self, "curve")
720
674
 
@@ -726,8 +680,7 @@ class KeysPkcArgs:
726
680
  @pulumi.getter(name="forceRwSession")
727
681
  def force_rw_session(self) -> Optional[pulumi.Input[str]]:
728
682
  """
729
- Force all operations to open up a read-write session to
730
- the HSM.
683
+ Force all operations to open up a read-write session to the HSM
731
684
  """
732
685
  return pulumi.get(self, "force_rw_session")
733
686
 
@@ -739,7 +692,7 @@ class KeysPkcArgs:
739
692
  @pulumi.getter(name="keyBits")
740
693
  def key_bits(self) -> Optional[pulumi.Input[str]]:
741
694
  """
742
- The size in bits for an RSA key.
695
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
743
696
  """
744
697
  return pulumi.get(self, "key_bits")
745
698
 
@@ -751,8 +704,7 @@ class KeysPkcArgs:
751
704
  @pulumi.getter
752
705
  def slot(self) -> Optional[pulumi.Input[str]]:
753
706
  """
754
- The slot number to use, specified as a string in a decimal format
755
- (e.g. `2305843009213693953`).
707
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
756
708
  """
757
709
  return pulumi.get(self, "slot")
758
710
 
@@ -764,7 +716,7 @@ class KeysPkcArgs:
764
716
  @pulumi.getter(name="tokenLabel")
765
717
  def token_label(self) -> Optional[pulumi.Input[str]]:
766
718
  """
767
- The slot token label to use.
719
+ The slot token label to use
768
720
  """
769
721
  return pulumi.get(self, "token_label")
770
722
 
@@ -24,10 +24,7 @@ class KeysArgs:
24
24
  The set of arguments for constructing a Keys resource.
25
25
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
26
26
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
27
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
- The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured namespace.
30
- *Available only for Vault Enterprise*.
27
+ :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
31
28
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
32
29
  """
33
30
  if aws is not None:
@@ -67,10 +64,7 @@ class KeysArgs:
67
64
  @pulumi.getter
68
65
  def namespace(self) -> Optional[pulumi.Input[str]]:
69
66
  """
70
- The namespace to provision the resource in.
71
- The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured namespace.
73
- *Available only for Vault Enterprise*.
67
+ Target namespace. (requires Enterprise)
74
68
  """
75
69
  return pulumi.get(self, "namespace")
76
70
 
@@ -102,10 +96,7 @@ class _KeysState:
102
96
  Input properties used for looking up and filtering Keys resources.
103
97
  :param pulumi.Input[Sequence[pulumi.Input['KeysAwArgs']]] aws: Configuration block for AWS Managed Keys
104
98
  :param pulumi.Input[Sequence[pulumi.Input['KeysAzureArgs']]] azures: Configuration block for Azure Managed Keys
105
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
106
- The value should not contain leading or trailing forward slashes.
107
- The `namespace` is always relative to the provider's configured namespace.
108
- *Available only for Vault Enterprise*.
99
+ :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
109
100
  :param pulumi.Input[Sequence[pulumi.Input['KeysPkcArgs']]] pkcs: Configuration block for PKCS Managed Keys
110
101
  """
111
102
  if aws is not None:
@@ -145,10 +136,7 @@ class _KeysState:
145
136
  @pulumi.getter
146
137
  def namespace(self) -> Optional[pulumi.Input[str]]:
147
138
  """
148
- The namespace to provision the resource in.
149
- The value should not contain leading or trailing forward slashes.
150
- The `namespace` is always relative to the provider's configured namespace.
151
- *Available only for Vault Enterprise*.
139
+ Target namespace. (requires Enterprise)
152
140
  """
153
141
  return pulumi.get(self, "namespace")
154
142
 
@@ -196,10 +184,7 @@ class Keys(pulumi.CustomResource):
196
184
  :param pulumi.ResourceOptions opts: Options for the resource.
197
185
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
198
186
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
199
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
200
- The value should not contain leading or trailing forward slashes.
201
- The `namespace` is always relative to the provider's configured namespace.
202
- *Available only for Vault Enterprise*.
187
+ :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
203
188
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
204
189
  """
205
190
  ...
@@ -276,10 +261,7 @@ class Keys(pulumi.CustomResource):
276
261
  :param pulumi.ResourceOptions opts: Options for the resource.
277
262
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAwArgs']]]] aws: Configuration block for AWS Managed Keys
278
263
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysAzureArgs']]]] azures: Configuration block for Azure Managed Keys
279
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
280
- The value should not contain leading or trailing forward slashes.
281
- The `namespace` is always relative to the provider's configured namespace.
282
- *Available only for Vault Enterprise*.
264
+ :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
283
265
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]] pkcs: Configuration block for PKCS Managed Keys
284
266
  """
285
267
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -312,10 +294,7 @@ class Keys(pulumi.CustomResource):
312
294
  @pulumi.getter
313
295
  def namespace(self) -> pulumi.Output[Optional[str]]:
314
296
  """
315
- The namespace to provision the resource in.
316
- The value should not contain leading or trailing forward slashes.
317
- The `namespace` is always relative to the provider's configured namespace.
318
- *Available only for Vault Enterprise*.
297
+ Target namespace. (requires Enterprise)
319
298
  """
320
299
  return pulumi.get(self, "namespace")
321
300