pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -66,26 +66,19 @@ class KeysAw(dict):
66
66
  region: Optional[str] = None,
67
67
  uuid: Optional[str] = None):
68
68
  """
69
- :param str access_key: The AWS access key to use.
70
- :param str key_bits: The size in bits for an RSA key.
71
- :param str key_type: The type of key to use.
72
- :param str kms_key: An identifier for the key.
73
- :param str name: A unique lowercase name that serves as identifying the key.
74
- :param str secret_key: The AWS access key to use.
75
- :param bool allow_generate_key: If no existing key can be found in
76
- the referenced backend, instructs Vault to generate a key within the backend.
77
- :param bool allow_replace_key: Controls the ability for Vault to replace through
78
- generation or importing a key into the configured backend even
79
- if a key is present, if set to `false` those operations are forbidden
80
- if a key exists.
81
- :param bool allow_store_key: Controls the ability for Vault to import a key to the
82
- configured backend, if `false`, those operations will be forbidden.
83
- :param bool any_mount: If `true`, allows usage from any mount point within the
84
- namespace.
85
- :param str curve: The curve to use for an ECDSA key. Used when `key_type`
86
- is `ECDSA`. Required if `allow_generate_key` is `true`.
87
- :param str endpoint: Used to specify a custom AWS endpoint.
88
- :param str region: The AWS region where the keys are stored (or will be stored).
69
+ :param str access_key: The AWS access key to use
70
+ :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
71
+ :param str key_type: The type of key to use
72
+ :param str kms_key: An identifier for the key
73
+ :param str name: A unique lowercase name that serves as identifying the key
74
+ :param str secret_key: The AWS secret key to use
75
+ :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
76
+ :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
77
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
78
+ :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
79
+ :param str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
80
+ :param str endpoint: Used to specify a custom AWS endpoint
81
+ :param str region: The AWS region where the keys are stored (or will be stored)
89
82
  :param str uuid: ID of the managed key read from Vault
90
83
  """
91
84
  pulumi.set(__self__, "access_key", access_key)
@@ -115,7 +108,7 @@ class KeysAw(dict):
115
108
  @pulumi.getter(name="accessKey")
116
109
  def access_key(self) -> str:
117
110
  """
118
- The AWS access key to use.
111
+ The AWS access key to use
119
112
  """
120
113
  return pulumi.get(self, "access_key")
121
114
 
@@ -123,7 +116,7 @@ class KeysAw(dict):
123
116
  @pulumi.getter(name="keyBits")
124
117
  def key_bits(self) -> str:
125
118
  """
126
- The size in bits for an RSA key.
119
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
127
120
  """
128
121
  return pulumi.get(self, "key_bits")
129
122
 
@@ -131,7 +124,7 @@ class KeysAw(dict):
131
124
  @pulumi.getter(name="keyType")
132
125
  def key_type(self) -> str:
133
126
  """
134
- The type of key to use.
127
+ The type of key to use
135
128
  """
136
129
  return pulumi.get(self, "key_type")
137
130
 
@@ -139,7 +132,7 @@ class KeysAw(dict):
139
132
  @pulumi.getter(name="kmsKey")
140
133
  def kms_key(self) -> str:
141
134
  """
142
- An identifier for the key.
135
+ An identifier for the key
143
136
  """
144
137
  return pulumi.get(self, "kms_key")
145
138
 
@@ -147,7 +140,7 @@ class KeysAw(dict):
147
140
  @pulumi.getter
148
141
  def name(self) -> str:
149
142
  """
150
- A unique lowercase name that serves as identifying the key.
143
+ A unique lowercase name that serves as identifying the key
151
144
  """
152
145
  return pulumi.get(self, "name")
153
146
 
@@ -155,7 +148,7 @@ class KeysAw(dict):
155
148
  @pulumi.getter(name="secretKey")
156
149
  def secret_key(self) -> str:
157
150
  """
158
- The AWS access key to use.
151
+ The AWS secret key to use
159
152
  """
160
153
  return pulumi.get(self, "secret_key")
161
154
 
@@ -163,8 +156,7 @@ class KeysAw(dict):
163
156
  @pulumi.getter(name="allowGenerateKey")
164
157
  def allow_generate_key(self) -> Optional[bool]:
165
158
  """
166
- If no existing key can be found in
167
- the referenced backend, instructs Vault to generate a key within the backend.
159
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
168
160
  """
169
161
  return pulumi.get(self, "allow_generate_key")
170
162
 
@@ -172,10 +164,7 @@ class KeysAw(dict):
172
164
  @pulumi.getter(name="allowReplaceKey")
173
165
  def allow_replace_key(self) -> Optional[bool]:
174
166
  """
175
- Controls the ability for Vault to replace through
176
- generation or importing a key into the configured backend even
177
- if a key is present, if set to `false` those operations are forbidden
178
- if a key exists.
167
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
179
168
  """
180
169
  return pulumi.get(self, "allow_replace_key")
181
170
 
@@ -183,8 +172,7 @@ class KeysAw(dict):
183
172
  @pulumi.getter(name="allowStoreKey")
184
173
  def allow_store_key(self) -> Optional[bool]:
185
174
  """
186
- Controls the ability for Vault to import a key to the
187
- configured backend, if `false`, those operations will be forbidden.
175
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
188
176
  """
189
177
  return pulumi.get(self, "allow_store_key")
190
178
 
@@ -192,8 +180,7 @@ class KeysAw(dict):
192
180
  @pulumi.getter(name="anyMount")
193
181
  def any_mount(self) -> Optional[bool]:
194
182
  """
195
- If `true`, allows usage from any mount point within the
196
- namespace.
183
+ Allow usage from any mount point within the namespace if 'true'
197
184
  """
198
185
  return pulumi.get(self, "any_mount")
199
186
 
@@ -201,8 +188,7 @@ class KeysAw(dict):
201
188
  @pulumi.getter
202
189
  def curve(self) -> Optional[str]:
203
190
  """
204
- The curve to use for an ECDSA key. Used when `key_type`
205
- is `ECDSA`. Required if `allow_generate_key` is `true`.
191
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
206
192
  """
207
193
  return pulumi.get(self, "curve")
208
194
 
@@ -210,7 +196,7 @@ class KeysAw(dict):
210
196
  @pulumi.getter
211
197
  def endpoint(self) -> Optional[str]:
212
198
  """
213
- Used to specify a custom AWS endpoint.
199
+ Used to specify a custom AWS endpoint
214
200
  """
215
201
  return pulumi.get(self, "endpoint")
216
202
 
@@ -218,7 +204,7 @@ class KeysAw(dict):
218
204
  @pulumi.getter
219
205
  def region(self) -> Optional[str]:
220
206
  """
221
- The AWS region where the keys are stored (or will be stored).
207
+ The AWS region where the keys are stored (or will be stored)
222
208
  """
223
209
  return pulumi.get(self, "region")
224
210
 
@@ -287,26 +273,20 @@ class KeysAzure(dict):
287
273
  resource: Optional[str] = None,
288
274
  uuid: Optional[str] = None):
289
275
  """
290
- :param str client_id: The client id for credentials to query the Azure APIs.
291
- :param str client_secret: The client secret for credentials to query the Azure APIs.
292
- :param str key_name: The Key Vault key to use for encryption and decryption.
293
- :param str key_type: The type of key to use.
294
- :param str name: A unique lowercase name that serves as identifying the key.
295
- :param str tenant_id: The tenant id for the Azure Active Directory organization.
296
- :param str vault_name: The Key Vault vault to use for encryption and decryption.
297
- :param bool allow_generate_key: If no existing key can be found in
298
- the referenced backend, instructs Vault to generate a key within the backend.
299
- :param bool allow_replace_key: Controls the ability for Vault to replace through
300
- generation or importing a key into the configured backend even
301
- if a key is present, if set to `false` those operations are forbidden
302
- if a key exists.
303
- :param bool allow_store_key: Controls the ability for Vault to import a key to the
304
- configured backend, if `false`, those operations will be forbidden.
305
- :param bool any_mount: If `true`, allows usage from any mount point within the
306
- namespace.
307
- :param str environment: The Azure Cloud environment API endpoints to use.
308
- :param str key_bits: The size in bits for an RSA key.
309
- :param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
276
+ :param str client_id: The client id for credentials to query the Azure APIs
277
+ :param str client_secret: The client secret for credentials to query the Azure APIs
278
+ :param str key_name: The Key Vault key to use for encryption and decryption
279
+ :param str key_type: The type of key to use
280
+ :param str name: A unique lowercase name that serves as identifying the key
281
+ :param str tenant_id: The tenant id for the Azure Active Directory organization
282
+ :param str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
283
+ :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
284
+ :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
285
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
286
+ :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
287
+ :param str environment: The Azure Cloud environment API endpoints to use
288
+ :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
289
+ :param str resource: The Azure Key Vault resource's DNS Suffix to connect to
310
290
  :param str uuid: ID of the managed key read from Vault
311
291
  """
312
292
  pulumi.set(__self__, "client_id", client_id)
@@ -337,7 +317,7 @@ class KeysAzure(dict):
337
317
  @pulumi.getter(name="clientId")
338
318
  def client_id(self) -> str:
339
319
  """
340
- The client id for credentials to query the Azure APIs.
320
+ The client id for credentials to query the Azure APIs
341
321
  """
342
322
  return pulumi.get(self, "client_id")
343
323
 
@@ -345,7 +325,7 @@ class KeysAzure(dict):
345
325
  @pulumi.getter(name="clientSecret")
346
326
  def client_secret(self) -> str:
347
327
  """
348
- The client secret for credentials to query the Azure APIs.
328
+ The client secret for credentials to query the Azure APIs
349
329
  """
350
330
  return pulumi.get(self, "client_secret")
351
331
 
@@ -353,7 +333,7 @@ class KeysAzure(dict):
353
333
  @pulumi.getter(name="keyName")
354
334
  def key_name(self) -> str:
355
335
  """
356
- The Key Vault key to use for encryption and decryption.
336
+ The Key Vault key to use for encryption and decryption
357
337
  """
358
338
  return pulumi.get(self, "key_name")
359
339
 
@@ -361,7 +341,7 @@ class KeysAzure(dict):
361
341
  @pulumi.getter(name="keyType")
362
342
  def key_type(self) -> str:
363
343
  """
364
- The type of key to use.
344
+ The type of key to use
365
345
  """
366
346
  return pulumi.get(self, "key_type")
367
347
 
@@ -369,7 +349,7 @@ class KeysAzure(dict):
369
349
  @pulumi.getter
370
350
  def name(self) -> str:
371
351
  """
372
- A unique lowercase name that serves as identifying the key.
352
+ A unique lowercase name that serves as identifying the key
373
353
  """
374
354
  return pulumi.get(self, "name")
375
355
 
@@ -377,7 +357,7 @@ class KeysAzure(dict):
377
357
  @pulumi.getter(name="tenantId")
378
358
  def tenant_id(self) -> str:
379
359
  """
380
- The tenant id for the Azure Active Directory organization.
360
+ The tenant id for the Azure Active Directory organization
381
361
  """
382
362
  return pulumi.get(self, "tenant_id")
383
363
 
@@ -385,7 +365,7 @@ class KeysAzure(dict):
385
365
  @pulumi.getter(name="vaultName")
386
366
  def vault_name(self) -> str:
387
367
  """
388
- The Key Vault vault to use for encryption and decryption.
368
+ The Key Vault vault to use the encryption keys for encryption and decryption
389
369
  """
390
370
  return pulumi.get(self, "vault_name")
391
371
 
@@ -393,8 +373,7 @@ class KeysAzure(dict):
393
373
  @pulumi.getter(name="allowGenerateKey")
394
374
  def allow_generate_key(self) -> Optional[bool]:
395
375
  """
396
- If no existing key can be found in
397
- the referenced backend, instructs Vault to generate a key within the backend.
376
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
398
377
  """
399
378
  return pulumi.get(self, "allow_generate_key")
400
379
 
@@ -402,10 +381,7 @@ class KeysAzure(dict):
402
381
  @pulumi.getter(name="allowReplaceKey")
403
382
  def allow_replace_key(self) -> Optional[bool]:
404
383
  """
405
- Controls the ability for Vault to replace through
406
- generation or importing a key into the configured backend even
407
- if a key is present, if set to `false` those operations are forbidden
408
- if a key exists.
384
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
409
385
  """
410
386
  return pulumi.get(self, "allow_replace_key")
411
387
 
@@ -413,8 +389,7 @@ class KeysAzure(dict):
413
389
  @pulumi.getter(name="allowStoreKey")
414
390
  def allow_store_key(self) -> Optional[bool]:
415
391
  """
416
- Controls the ability for Vault to import a key to the
417
- configured backend, if `false`, those operations will be forbidden.
392
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
418
393
  """
419
394
  return pulumi.get(self, "allow_store_key")
420
395
 
@@ -422,8 +397,7 @@ class KeysAzure(dict):
422
397
  @pulumi.getter(name="anyMount")
423
398
  def any_mount(self) -> Optional[bool]:
424
399
  """
425
- If `true`, allows usage from any mount point within the
426
- namespace.
400
+ Allow usage from any mount point within the namespace if 'true'
427
401
  """
428
402
  return pulumi.get(self, "any_mount")
429
403
 
@@ -431,7 +405,7 @@ class KeysAzure(dict):
431
405
  @pulumi.getter
432
406
  def environment(self) -> Optional[str]:
433
407
  """
434
- The Azure Cloud environment API endpoints to use.
408
+ The Azure Cloud environment API endpoints to use
435
409
  """
436
410
  return pulumi.get(self, "environment")
437
411
 
@@ -439,7 +413,7 @@ class KeysAzure(dict):
439
413
  @pulumi.getter(name="keyBits")
440
414
  def key_bits(self) -> Optional[str]:
441
415
  """
442
- The size in bits for an RSA key.
416
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
443
417
  """
444
418
  return pulumi.get(self, "key_bits")
445
419
 
@@ -447,7 +421,7 @@ class KeysAzure(dict):
447
421
  @pulumi.getter
448
422
  def resource(self) -> Optional[str]:
449
423
  """
450
- The Azure Key Vault resource's DNS Suffix to connect to.
424
+ The Azure Key Vault resource's DNS Suffix to connect to
451
425
  """
452
426
  return pulumi.get(self, "resource")
453
427
 
@@ -513,32 +487,21 @@ class KeysPkc(dict):
513
487
  token_label: Optional[str] = None,
514
488
  uuid: Optional[str] = None):
515
489
  """
516
- :param str key_id: The id of a PKCS#11 key to use.
517
- :param str key_label: The label of the key to use.
518
- :param str library: The name of the kms_library stanza to use from Vault's config
519
- to lookup the local library path.
520
- :param str mechanism: The encryption/decryption mechanism to use, specified as a
521
- hexadecimal (prefixed by 0x) string.
522
- :param str name: A unique lowercase name that serves as identifying the key.
523
- :param str pin: The PIN for login.
524
- :param bool allow_generate_key: If no existing key can be found in
525
- the referenced backend, instructs Vault to generate a key within the backend.
526
- :param bool allow_replace_key: Controls the ability for Vault to replace through
527
- generation or importing a key into the configured backend even
528
- if a key is present, if set to `false` those operations are forbidden
529
- if a key exists.
530
- :param bool allow_store_key: Controls the ability for Vault to import a key to the
531
- configured backend, if `false`, those operations will be forbidden.
532
- :param bool any_mount: If `true`, allows usage from any mount point within the
533
- namespace.
534
- :param str curve: The curve to use for an ECDSA key. Used when `key_type`
535
- is `ECDSA`. Required if `allow_generate_key` is `true`.
536
- :param str force_rw_session: Force all operations to open up a read-write session to
537
- the HSM.
538
- :param str key_bits: The size in bits for an RSA key.
539
- :param str slot: The slot number to use, specified as a string in a decimal format
540
- (e.g. `2305843009213693953`).
541
- :param str token_label: The slot token label to use.
490
+ :param str key_id: The id of a PKCS#11 key to use
491
+ :param str key_label: The label of the key to use
492
+ :param str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
493
+ :param str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
494
+ :param str name: A unique lowercase name that serves as identifying the key
495
+ :param str pin: The PIN for login
496
+ :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
497
+ :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
498
+ :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
499
+ :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
500
+ :param str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
501
+ :param str force_rw_session: Force all operations to open up a read-write session to the HSM
502
+ :param str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
503
+ :param str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
504
+ :param str token_label: The slot token label to use
542
505
  :param str uuid: ID of the managed key read from Vault
543
506
  """
544
507
  pulumi.set(__self__, "key_id", key_id)
@@ -572,7 +535,7 @@ class KeysPkc(dict):
572
535
  @pulumi.getter(name="keyId")
573
536
  def key_id(self) -> str:
574
537
  """
575
- The id of a PKCS#11 key to use.
538
+ The id of a PKCS#11 key to use
576
539
  """
577
540
  return pulumi.get(self, "key_id")
578
541
 
@@ -580,7 +543,7 @@ class KeysPkc(dict):
580
543
  @pulumi.getter(name="keyLabel")
581
544
  def key_label(self) -> str:
582
545
  """
583
- The label of the key to use.
546
+ The label of the key to use
584
547
  """
585
548
  return pulumi.get(self, "key_label")
586
549
 
@@ -588,8 +551,7 @@ class KeysPkc(dict):
588
551
  @pulumi.getter
589
552
  def library(self) -> str:
590
553
  """
591
- The name of the kms_library stanza to use from Vault's config
592
- to lookup the local library path.
554
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
593
555
  """
594
556
  return pulumi.get(self, "library")
595
557
 
@@ -597,8 +559,7 @@ class KeysPkc(dict):
597
559
  @pulumi.getter
598
560
  def mechanism(self) -> str:
599
561
  """
600
- The encryption/decryption mechanism to use, specified as a
601
- hexadecimal (prefixed by 0x) string.
562
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
602
563
  """
603
564
  return pulumi.get(self, "mechanism")
604
565
 
@@ -606,7 +567,7 @@ class KeysPkc(dict):
606
567
  @pulumi.getter
607
568
  def name(self) -> str:
608
569
  """
609
- A unique lowercase name that serves as identifying the key.
570
+ A unique lowercase name that serves as identifying the key
610
571
  """
611
572
  return pulumi.get(self, "name")
612
573
 
@@ -614,7 +575,7 @@ class KeysPkc(dict):
614
575
  @pulumi.getter
615
576
  def pin(self) -> str:
616
577
  """
617
- The PIN for login.
578
+ The PIN for login
618
579
  """
619
580
  return pulumi.get(self, "pin")
620
581
 
@@ -622,8 +583,7 @@ class KeysPkc(dict):
622
583
  @pulumi.getter(name="allowGenerateKey")
623
584
  def allow_generate_key(self) -> Optional[bool]:
624
585
  """
625
- If no existing key can be found in
626
- the referenced backend, instructs Vault to generate a key within the backend.
586
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
627
587
  """
628
588
  return pulumi.get(self, "allow_generate_key")
629
589
 
@@ -631,10 +591,7 @@ class KeysPkc(dict):
631
591
  @pulumi.getter(name="allowReplaceKey")
632
592
  def allow_replace_key(self) -> Optional[bool]:
633
593
  """
634
- Controls the ability for Vault to replace through
635
- generation or importing a key into the configured backend even
636
- if a key is present, if set to `false` those operations are forbidden
637
- if a key exists.
594
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
638
595
  """
639
596
  return pulumi.get(self, "allow_replace_key")
640
597
 
@@ -642,8 +599,7 @@ class KeysPkc(dict):
642
599
  @pulumi.getter(name="allowStoreKey")
643
600
  def allow_store_key(self) -> Optional[bool]:
644
601
  """
645
- Controls the ability for Vault to import a key to the
646
- configured backend, if `false`, those operations will be forbidden.
602
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
647
603
  """
648
604
  return pulumi.get(self, "allow_store_key")
649
605
 
@@ -651,8 +607,7 @@ class KeysPkc(dict):
651
607
  @pulumi.getter(name="anyMount")
652
608
  def any_mount(self) -> Optional[bool]:
653
609
  """
654
- If `true`, allows usage from any mount point within the
655
- namespace.
610
+ Allow usage from any mount point within the namespace if 'true'
656
611
  """
657
612
  return pulumi.get(self, "any_mount")
658
613
 
@@ -660,8 +615,7 @@ class KeysPkc(dict):
660
615
  @pulumi.getter
661
616
  def curve(self) -> Optional[str]:
662
617
  """
663
- The curve to use for an ECDSA key. Used when `key_type`
664
- is `ECDSA`. Required if `allow_generate_key` is `true`.
618
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
665
619
  """
666
620
  return pulumi.get(self, "curve")
667
621
 
@@ -669,8 +623,7 @@ class KeysPkc(dict):
669
623
  @pulumi.getter(name="forceRwSession")
670
624
  def force_rw_session(self) -> Optional[str]:
671
625
  """
672
- Force all operations to open up a read-write session to
673
- the HSM.
626
+ Force all operations to open up a read-write session to the HSM
674
627
  """
675
628
  return pulumi.get(self, "force_rw_session")
676
629
 
@@ -678,7 +631,7 @@ class KeysPkc(dict):
678
631
  @pulumi.getter(name="keyBits")
679
632
  def key_bits(self) -> Optional[str]:
680
633
  """
681
- The size in bits for an RSA key.
634
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
682
635
  """
683
636
  return pulumi.get(self, "key_bits")
684
637
 
@@ -686,8 +639,7 @@ class KeysPkc(dict):
686
639
  @pulumi.getter
687
640
  def slot(self) -> Optional[str]:
688
641
  """
689
- The slot number to use, specified as a string in a decimal format
690
- (e.g. `2305843009213693953`).
642
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
691
643
  """
692
644
  return pulumi.get(self, "slot")
693
645
 
@@ -695,7 +647,7 @@ class KeysPkc(dict):
695
647
  @pulumi.getter(name="tokenLabel")
696
648
  def token_label(self) -> Optional[str]:
697
649
  """
698
- The slot token label to use.
650
+ The slot token label to use
699
651
  """
700
652
  return pulumi.get(self, "token_label")
701
653
 
pulumi_vault/mfa_duo.py CHANGED
@@ -328,7 +328,6 @@ class MfaDuo(pulumi.CustomResource):
328
328
 
329
329
  ## Example Usage
330
330
 
331
- <!--Start PulumiCodeChooser -->
332
331
  ```python
333
332
  import pulumi
334
333
  import pulumi_vault as vault
@@ -343,7 +342,6 @@ class MfaDuo(pulumi.CustomResource):
343
342
  integration_key="BIACEUEAXI20BNWTEYXT",
344
343
  api_hostname="api-2b5c39f5.duosecurity.com")
345
344
  ```
346
- <!--End PulumiCodeChooser -->
347
345
 
348
346
  ## Import
349
347
 
@@ -384,7 +382,6 @@ class MfaDuo(pulumi.CustomResource):
384
382
 
385
383
  ## Example Usage
386
384
 
387
- <!--Start PulumiCodeChooser -->
388
385
  ```python
389
386
  import pulumi
390
387
  import pulumi_vault as vault
@@ -399,7 +396,6 @@ class MfaDuo(pulumi.CustomResource):
399
396
  integration_key="BIACEUEAXI20BNWTEYXT",
400
397
  api_hostname="api-2b5c39f5.duosecurity.com")
401
398
  ```
402
- <!--End PulumiCodeChooser -->
403
399
 
404
400
  ## Import
405
401
 
pulumi_vault/mfa_okta.py CHANGED
@@ -349,7 +349,6 @@ class MfaOkta(pulumi.CustomResource):
349
349
 
350
350
  ## Example Usage
351
351
 
352
- <!--Start PulumiCodeChooser -->
353
352
  ```python
354
353
  import pulumi
355
354
  import pulumi_vault as vault
@@ -364,7 +363,6 @@ class MfaOkta(pulumi.CustomResource):
364
363
  org_name="hashicorp",
365
364
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
366
365
  ```
367
- <!--End PulumiCodeChooser -->
368
366
 
369
367
  ## Import
370
368
 
@@ -410,7 +408,6 @@ class MfaOkta(pulumi.CustomResource):
410
408
 
411
409
  ## Example Usage
412
410
 
413
- <!--Start PulumiCodeChooser -->
414
411
  ```python
415
412
  import pulumi
416
413
  import pulumi_vault as vault
@@ -425,7 +422,6 @@ class MfaOkta(pulumi.CustomResource):
425
422
  org_name="hashicorp",
426
423
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
427
424
  ```
428
- <!--End PulumiCodeChooser -->
429
425
 
430
426
  ## Import
431
427
 
@@ -359,7 +359,6 @@ class MfaPingid(pulumi.CustomResource):
359
359
 
360
360
  ## Example Usage
361
361
 
362
- <!--Start PulumiCodeChooser -->
363
362
  ```python
364
363
  import pulumi
365
364
  import pulumi_vault as vault
@@ -375,7 +374,6 @@ class MfaPingid(pulumi.CustomResource):
375
374
  username_format="user@example.com",
376
375
  settings_file_base64=settings_file)
377
376
  ```
378
- <!--End PulumiCodeChooser -->
379
377
 
380
378
  ## Import
381
379
 
@@ -417,7 +415,6 @@ class MfaPingid(pulumi.CustomResource):
417
415
 
418
416
  ## Example Usage
419
417
 
420
- <!--Start PulumiCodeChooser -->
421
418
  ```python
422
419
  import pulumi
423
420
  import pulumi_vault as vault
@@ -433,7 +430,6 @@ class MfaPingid(pulumi.CustomResource):
433
430
  username_format="user@example.com",
434
431
  settings_file_base64=settings_file)
435
432
  ```
436
- <!--End PulumiCodeChooser -->
437
433
 
438
434
  ## Import
439
435
 
pulumi_vault/mfa_totp.py CHANGED
@@ -360,7 +360,6 @@ class MfaTotp(pulumi.CustomResource):
360
360
 
361
361
  ## Example Usage
362
362
 
363
- <!--Start PulumiCodeChooser -->
364
363
  ```python
365
364
  import pulumi
366
365
  import pulumi_vault as vault
@@ -373,7 +372,6 @@ class MfaTotp(pulumi.CustomResource):
373
372
  digits=8,
374
373
  key_size=20)
375
374
  ```
376
- <!--End PulumiCodeChooser -->
377
375
 
378
376
  ## Import
379
377
 
@@ -414,7 +412,6 @@ class MfaTotp(pulumi.CustomResource):
414
412
 
415
413
  ## Example Usage
416
414
 
417
- <!--Start PulumiCodeChooser -->
418
415
  ```python
419
416
  import pulumi
420
417
  import pulumi_vault as vault
@@ -427,7 +424,6 @@ class MfaTotp(pulumi.CustomResource):
427
424
  digits=8,
428
425
  key_size=20)
429
426
  ```
430
- <!--End PulumiCodeChooser -->
431
427
 
432
428
  ## Import
433
429