pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/outputs.py
CHANGED
@@ -66,26 +66,19 @@ class KeysAw(dict):
|
|
66
66
|
region: Optional[str] = None,
|
67
67
|
uuid: Optional[str] = None):
|
68
68
|
"""
|
69
|
-
:param str access_key: The AWS access key to use
|
70
|
-
:param str key_bits: The size in bits for an RSA key.
|
71
|
-
:param str key_type: The type of key to use
|
72
|
-
:param str kms_key: An identifier for the key
|
73
|
-
:param str name: A unique lowercase name that serves as identifying the key
|
74
|
-
:param str secret_key: The AWS
|
75
|
-
:param bool allow_generate_key: If no existing key can be found in
|
76
|
-
|
77
|
-
:param bool
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
:param
|
82
|
-
configured backend, if `false`, those operations will be forbidden.
|
83
|
-
:param bool any_mount: If `true`, allows usage from any mount point within the
|
84
|
-
namespace.
|
85
|
-
:param str curve: The curve to use for an ECDSA key. Used when `key_type`
|
86
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
87
|
-
:param str endpoint: Used to specify a custom AWS endpoint.
|
88
|
-
:param str region: The AWS region where the keys are stored (or will be stored).
|
69
|
+
:param str access_key: The AWS access key to use
|
70
|
+
:param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
71
|
+
:param str key_type: The type of key to use
|
72
|
+
:param str kms_key: An identifier for the key
|
73
|
+
:param str name: A unique lowercase name that serves as identifying the key
|
74
|
+
:param str secret_key: The AWS secret key to use
|
75
|
+
:param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
76
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
77
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
78
|
+
:param bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
79
|
+
:param str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
80
|
+
:param str endpoint: Used to specify a custom AWS endpoint
|
81
|
+
:param str region: The AWS region where the keys are stored (or will be stored)
|
89
82
|
:param str uuid: ID of the managed key read from Vault
|
90
83
|
"""
|
91
84
|
pulumi.set(__self__, "access_key", access_key)
|
@@ -115,7 +108,7 @@ class KeysAw(dict):
|
|
115
108
|
@pulumi.getter(name="accessKey")
|
116
109
|
def access_key(self) -> str:
|
117
110
|
"""
|
118
|
-
The AWS access key to use
|
111
|
+
The AWS access key to use
|
119
112
|
"""
|
120
113
|
return pulumi.get(self, "access_key")
|
121
114
|
|
@@ -123,7 +116,7 @@ class KeysAw(dict):
|
|
123
116
|
@pulumi.getter(name="keyBits")
|
124
117
|
def key_bits(self) -> str:
|
125
118
|
"""
|
126
|
-
The size in bits for an RSA key.
|
119
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
127
120
|
"""
|
128
121
|
return pulumi.get(self, "key_bits")
|
129
122
|
|
@@ -131,7 +124,7 @@ class KeysAw(dict):
|
|
131
124
|
@pulumi.getter(name="keyType")
|
132
125
|
def key_type(self) -> str:
|
133
126
|
"""
|
134
|
-
The type of key to use
|
127
|
+
The type of key to use
|
135
128
|
"""
|
136
129
|
return pulumi.get(self, "key_type")
|
137
130
|
|
@@ -139,7 +132,7 @@ class KeysAw(dict):
|
|
139
132
|
@pulumi.getter(name="kmsKey")
|
140
133
|
def kms_key(self) -> str:
|
141
134
|
"""
|
142
|
-
An identifier for the key
|
135
|
+
An identifier for the key
|
143
136
|
"""
|
144
137
|
return pulumi.get(self, "kms_key")
|
145
138
|
|
@@ -147,7 +140,7 @@ class KeysAw(dict):
|
|
147
140
|
@pulumi.getter
|
148
141
|
def name(self) -> str:
|
149
142
|
"""
|
150
|
-
A unique lowercase name that serves as identifying the key
|
143
|
+
A unique lowercase name that serves as identifying the key
|
151
144
|
"""
|
152
145
|
return pulumi.get(self, "name")
|
153
146
|
|
@@ -155,7 +148,7 @@ class KeysAw(dict):
|
|
155
148
|
@pulumi.getter(name="secretKey")
|
156
149
|
def secret_key(self) -> str:
|
157
150
|
"""
|
158
|
-
The AWS
|
151
|
+
The AWS secret key to use
|
159
152
|
"""
|
160
153
|
return pulumi.get(self, "secret_key")
|
161
154
|
|
@@ -163,8 +156,7 @@ class KeysAw(dict):
|
|
163
156
|
@pulumi.getter(name="allowGenerateKey")
|
164
157
|
def allow_generate_key(self) -> Optional[bool]:
|
165
158
|
"""
|
166
|
-
If no existing key can be found in
|
167
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
159
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
168
160
|
"""
|
169
161
|
return pulumi.get(self, "allow_generate_key")
|
170
162
|
|
@@ -172,10 +164,7 @@ class KeysAw(dict):
|
|
172
164
|
@pulumi.getter(name="allowReplaceKey")
|
173
165
|
def allow_replace_key(self) -> Optional[bool]:
|
174
166
|
"""
|
175
|
-
Controls the ability for Vault to replace through
|
176
|
-
generation or importing a key into the configured backend even
|
177
|
-
if a key is present, if set to `false` those operations are forbidden
|
178
|
-
if a key exists.
|
167
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
179
168
|
"""
|
180
169
|
return pulumi.get(self, "allow_replace_key")
|
181
170
|
|
@@ -183,8 +172,7 @@ class KeysAw(dict):
|
|
183
172
|
@pulumi.getter(name="allowStoreKey")
|
184
173
|
def allow_store_key(self) -> Optional[bool]:
|
185
174
|
"""
|
186
|
-
Controls the ability for Vault to import a key to the
|
187
|
-
configured backend, if `false`, those operations will be forbidden.
|
175
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
188
176
|
"""
|
189
177
|
return pulumi.get(self, "allow_store_key")
|
190
178
|
|
@@ -192,8 +180,7 @@ class KeysAw(dict):
|
|
192
180
|
@pulumi.getter(name="anyMount")
|
193
181
|
def any_mount(self) -> Optional[bool]:
|
194
182
|
"""
|
195
|
-
|
196
|
-
namespace.
|
183
|
+
Allow usage from any mount point within the namespace if 'true'
|
197
184
|
"""
|
198
185
|
return pulumi.get(self, "any_mount")
|
199
186
|
|
@@ -201,8 +188,7 @@ class KeysAw(dict):
|
|
201
188
|
@pulumi.getter
|
202
189
|
def curve(self) -> Optional[str]:
|
203
190
|
"""
|
204
|
-
The curve to use for an ECDSA key. Used when
|
205
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
191
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
206
192
|
"""
|
207
193
|
return pulumi.get(self, "curve")
|
208
194
|
|
@@ -210,7 +196,7 @@ class KeysAw(dict):
|
|
210
196
|
@pulumi.getter
|
211
197
|
def endpoint(self) -> Optional[str]:
|
212
198
|
"""
|
213
|
-
Used to specify a custom AWS endpoint
|
199
|
+
Used to specify a custom AWS endpoint
|
214
200
|
"""
|
215
201
|
return pulumi.get(self, "endpoint")
|
216
202
|
|
@@ -218,7 +204,7 @@ class KeysAw(dict):
|
|
218
204
|
@pulumi.getter
|
219
205
|
def region(self) -> Optional[str]:
|
220
206
|
"""
|
221
|
-
The AWS region where the keys are stored (or will be stored)
|
207
|
+
The AWS region where the keys are stored (or will be stored)
|
222
208
|
"""
|
223
209
|
return pulumi.get(self, "region")
|
224
210
|
|
@@ -287,26 +273,20 @@ class KeysAzure(dict):
|
|
287
273
|
resource: Optional[str] = None,
|
288
274
|
uuid: Optional[str] = None):
|
289
275
|
"""
|
290
|
-
:param str client_id: The client id for credentials to query the Azure APIs
|
291
|
-
:param str client_secret: The client secret for credentials to query the Azure APIs
|
292
|
-
:param str key_name: The Key Vault key to use for encryption and decryption
|
293
|
-
:param str key_type: The type of key to use
|
294
|
-
:param str name: A unique lowercase name that serves as identifying the key
|
295
|
-
:param str tenant_id: The tenant id for the Azure Active Directory organization
|
296
|
-
:param str vault_name: The Key Vault vault to use for encryption and decryption
|
297
|
-
:param bool allow_generate_key: If no existing key can be found in
|
298
|
-
|
299
|
-
:param bool
|
300
|
-
|
301
|
-
|
302
|
-
|
303
|
-
:param
|
304
|
-
configured backend, if `false`, those operations will be forbidden.
|
305
|
-
:param bool any_mount: If `true`, allows usage from any mount point within the
|
306
|
-
namespace.
|
307
|
-
:param str environment: The Azure Cloud environment API endpoints to use.
|
308
|
-
:param str key_bits: The size in bits for an RSA key.
|
309
|
-
:param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
276
|
+
:param str client_id: The client id for credentials to query the Azure APIs
|
277
|
+
:param str client_secret: The client secret for credentials to query the Azure APIs
|
278
|
+
:param str key_name: The Key Vault key to use for encryption and decryption
|
279
|
+
:param str key_type: The type of key to use
|
280
|
+
:param str name: A unique lowercase name that serves as identifying the key
|
281
|
+
:param str tenant_id: The tenant id for the Azure Active Directory organization
|
282
|
+
:param str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
283
|
+
:param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
284
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
285
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
286
|
+
:param bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
287
|
+
:param str environment: The Azure Cloud environment API endpoints to use
|
288
|
+
:param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
289
|
+
:param str resource: The Azure Key Vault resource's DNS Suffix to connect to
|
310
290
|
:param str uuid: ID of the managed key read from Vault
|
311
291
|
"""
|
312
292
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -337,7 +317,7 @@ class KeysAzure(dict):
|
|
337
317
|
@pulumi.getter(name="clientId")
|
338
318
|
def client_id(self) -> str:
|
339
319
|
"""
|
340
|
-
The client id for credentials to query the Azure APIs
|
320
|
+
The client id for credentials to query the Azure APIs
|
341
321
|
"""
|
342
322
|
return pulumi.get(self, "client_id")
|
343
323
|
|
@@ -345,7 +325,7 @@ class KeysAzure(dict):
|
|
345
325
|
@pulumi.getter(name="clientSecret")
|
346
326
|
def client_secret(self) -> str:
|
347
327
|
"""
|
348
|
-
The client secret for credentials to query the Azure APIs
|
328
|
+
The client secret for credentials to query the Azure APIs
|
349
329
|
"""
|
350
330
|
return pulumi.get(self, "client_secret")
|
351
331
|
|
@@ -353,7 +333,7 @@ class KeysAzure(dict):
|
|
353
333
|
@pulumi.getter(name="keyName")
|
354
334
|
def key_name(self) -> str:
|
355
335
|
"""
|
356
|
-
The Key Vault key to use for encryption and decryption
|
336
|
+
The Key Vault key to use for encryption and decryption
|
357
337
|
"""
|
358
338
|
return pulumi.get(self, "key_name")
|
359
339
|
|
@@ -361,7 +341,7 @@ class KeysAzure(dict):
|
|
361
341
|
@pulumi.getter(name="keyType")
|
362
342
|
def key_type(self) -> str:
|
363
343
|
"""
|
364
|
-
The type of key to use
|
344
|
+
The type of key to use
|
365
345
|
"""
|
366
346
|
return pulumi.get(self, "key_type")
|
367
347
|
|
@@ -369,7 +349,7 @@ class KeysAzure(dict):
|
|
369
349
|
@pulumi.getter
|
370
350
|
def name(self) -> str:
|
371
351
|
"""
|
372
|
-
A unique lowercase name that serves as identifying the key
|
352
|
+
A unique lowercase name that serves as identifying the key
|
373
353
|
"""
|
374
354
|
return pulumi.get(self, "name")
|
375
355
|
|
@@ -377,7 +357,7 @@ class KeysAzure(dict):
|
|
377
357
|
@pulumi.getter(name="tenantId")
|
378
358
|
def tenant_id(self) -> str:
|
379
359
|
"""
|
380
|
-
The tenant id for the Azure Active Directory organization
|
360
|
+
The tenant id for the Azure Active Directory organization
|
381
361
|
"""
|
382
362
|
return pulumi.get(self, "tenant_id")
|
383
363
|
|
@@ -385,7 +365,7 @@ class KeysAzure(dict):
|
|
385
365
|
@pulumi.getter(name="vaultName")
|
386
366
|
def vault_name(self) -> str:
|
387
367
|
"""
|
388
|
-
The Key Vault vault to use for encryption and decryption
|
368
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
389
369
|
"""
|
390
370
|
return pulumi.get(self, "vault_name")
|
391
371
|
|
@@ -393,8 +373,7 @@ class KeysAzure(dict):
|
|
393
373
|
@pulumi.getter(name="allowGenerateKey")
|
394
374
|
def allow_generate_key(self) -> Optional[bool]:
|
395
375
|
"""
|
396
|
-
If no existing key can be found in
|
397
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
376
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
398
377
|
"""
|
399
378
|
return pulumi.get(self, "allow_generate_key")
|
400
379
|
|
@@ -402,10 +381,7 @@ class KeysAzure(dict):
|
|
402
381
|
@pulumi.getter(name="allowReplaceKey")
|
403
382
|
def allow_replace_key(self) -> Optional[bool]:
|
404
383
|
"""
|
405
|
-
Controls the ability for Vault to replace through
|
406
|
-
generation or importing a key into the configured backend even
|
407
|
-
if a key is present, if set to `false` those operations are forbidden
|
408
|
-
if a key exists.
|
384
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
409
385
|
"""
|
410
386
|
return pulumi.get(self, "allow_replace_key")
|
411
387
|
|
@@ -413,8 +389,7 @@ class KeysAzure(dict):
|
|
413
389
|
@pulumi.getter(name="allowStoreKey")
|
414
390
|
def allow_store_key(self) -> Optional[bool]:
|
415
391
|
"""
|
416
|
-
Controls the ability for Vault to import a key to the
|
417
|
-
configured backend, if `false`, those operations will be forbidden.
|
392
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
418
393
|
"""
|
419
394
|
return pulumi.get(self, "allow_store_key")
|
420
395
|
|
@@ -422,8 +397,7 @@ class KeysAzure(dict):
|
|
422
397
|
@pulumi.getter(name="anyMount")
|
423
398
|
def any_mount(self) -> Optional[bool]:
|
424
399
|
"""
|
425
|
-
|
426
|
-
namespace.
|
400
|
+
Allow usage from any mount point within the namespace if 'true'
|
427
401
|
"""
|
428
402
|
return pulumi.get(self, "any_mount")
|
429
403
|
|
@@ -431,7 +405,7 @@ class KeysAzure(dict):
|
|
431
405
|
@pulumi.getter
|
432
406
|
def environment(self) -> Optional[str]:
|
433
407
|
"""
|
434
|
-
The Azure Cloud environment API endpoints to use
|
408
|
+
The Azure Cloud environment API endpoints to use
|
435
409
|
"""
|
436
410
|
return pulumi.get(self, "environment")
|
437
411
|
|
@@ -439,7 +413,7 @@ class KeysAzure(dict):
|
|
439
413
|
@pulumi.getter(name="keyBits")
|
440
414
|
def key_bits(self) -> Optional[str]:
|
441
415
|
"""
|
442
|
-
The size in bits for an RSA key.
|
416
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
443
417
|
"""
|
444
418
|
return pulumi.get(self, "key_bits")
|
445
419
|
|
@@ -447,7 +421,7 @@ class KeysAzure(dict):
|
|
447
421
|
@pulumi.getter
|
448
422
|
def resource(self) -> Optional[str]:
|
449
423
|
"""
|
450
|
-
The Azure Key Vault resource's DNS Suffix to connect to
|
424
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
451
425
|
"""
|
452
426
|
return pulumi.get(self, "resource")
|
453
427
|
|
@@ -513,32 +487,21 @@ class KeysPkc(dict):
|
|
513
487
|
token_label: Optional[str] = None,
|
514
488
|
uuid: Optional[str] = None):
|
515
489
|
"""
|
516
|
-
:param str key_id: The id of a PKCS#11 key to use
|
517
|
-
:param str key_label: The label of the key to use
|
518
|
-
:param str library: The name of the kms_library stanza to use from Vault's config
|
519
|
-
|
520
|
-
:param str
|
521
|
-
|
522
|
-
:param
|
523
|
-
:param
|
524
|
-
:param bool
|
525
|
-
|
526
|
-
:param
|
527
|
-
|
528
|
-
|
529
|
-
|
530
|
-
:param
|
531
|
-
configured backend, if `false`, those operations will be forbidden.
|
532
|
-
:param bool any_mount: If `true`, allows usage from any mount point within the
|
533
|
-
namespace.
|
534
|
-
:param str curve: The curve to use for an ECDSA key. Used when `key_type`
|
535
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
536
|
-
:param str force_rw_session: Force all operations to open up a read-write session to
|
537
|
-
the HSM.
|
538
|
-
:param str key_bits: The size in bits for an RSA key.
|
539
|
-
:param str slot: The slot number to use, specified as a string in a decimal format
|
540
|
-
(e.g. `2305843009213693953`).
|
541
|
-
:param str token_label: The slot token label to use.
|
490
|
+
:param str key_id: The id of a PKCS#11 key to use
|
491
|
+
:param str key_label: The label of the key to use
|
492
|
+
:param str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
493
|
+
:param str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
494
|
+
:param str name: A unique lowercase name that serves as identifying the key
|
495
|
+
:param str pin: The PIN for login
|
496
|
+
:param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
497
|
+
:param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
498
|
+
:param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
499
|
+
:param bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
500
|
+
:param str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
501
|
+
:param str force_rw_session: Force all operations to open up a read-write session to the HSM
|
502
|
+
:param str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
503
|
+
:param str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
504
|
+
:param str token_label: The slot token label to use
|
542
505
|
:param str uuid: ID of the managed key read from Vault
|
543
506
|
"""
|
544
507
|
pulumi.set(__self__, "key_id", key_id)
|
@@ -572,7 +535,7 @@ class KeysPkc(dict):
|
|
572
535
|
@pulumi.getter(name="keyId")
|
573
536
|
def key_id(self) -> str:
|
574
537
|
"""
|
575
|
-
The id of a PKCS#11 key to use
|
538
|
+
The id of a PKCS#11 key to use
|
576
539
|
"""
|
577
540
|
return pulumi.get(self, "key_id")
|
578
541
|
|
@@ -580,7 +543,7 @@ class KeysPkc(dict):
|
|
580
543
|
@pulumi.getter(name="keyLabel")
|
581
544
|
def key_label(self) -> str:
|
582
545
|
"""
|
583
|
-
The label of the key to use
|
546
|
+
The label of the key to use
|
584
547
|
"""
|
585
548
|
return pulumi.get(self, "key_label")
|
586
549
|
|
@@ -588,8 +551,7 @@ class KeysPkc(dict):
|
|
588
551
|
@pulumi.getter
|
589
552
|
def library(self) -> str:
|
590
553
|
"""
|
591
|
-
The name of the kms_library stanza to use from Vault's config
|
592
|
-
to lookup the local library path.
|
554
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
593
555
|
"""
|
594
556
|
return pulumi.get(self, "library")
|
595
557
|
|
@@ -597,8 +559,7 @@ class KeysPkc(dict):
|
|
597
559
|
@pulumi.getter
|
598
560
|
def mechanism(self) -> str:
|
599
561
|
"""
|
600
|
-
The encryption/decryption mechanism to use, specified as a
|
601
|
-
hexadecimal (prefixed by 0x) string.
|
562
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
602
563
|
"""
|
603
564
|
return pulumi.get(self, "mechanism")
|
604
565
|
|
@@ -606,7 +567,7 @@ class KeysPkc(dict):
|
|
606
567
|
@pulumi.getter
|
607
568
|
def name(self) -> str:
|
608
569
|
"""
|
609
|
-
A unique lowercase name that serves as identifying the key
|
570
|
+
A unique lowercase name that serves as identifying the key
|
610
571
|
"""
|
611
572
|
return pulumi.get(self, "name")
|
612
573
|
|
@@ -614,7 +575,7 @@ class KeysPkc(dict):
|
|
614
575
|
@pulumi.getter
|
615
576
|
def pin(self) -> str:
|
616
577
|
"""
|
617
|
-
The PIN for login
|
578
|
+
The PIN for login
|
618
579
|
"""
|
619
580
|
return pulumi.get(self, "pin")
|
620
581
|
|
@@ -622,8 +583,7 @@ class KeysPkc(dict):
|
|
622
583
|
@pulumi.getter(name="allowGenerateKey")
|
623
584
|
def allow_generate_key(self) -> Optional[bool]:
|
624
585
|
"""
|
625
|
-
If no existing key can be found in
|
626
|
-
the referenced backend, instructs Vault to generate a key within the backend.
|
586
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
627
587
|
"""
|
628
588
|
return pulumi.get(self, "allow_generate_key")
|
629
589
|
|
@@ -631,10 +591,7 @@ class KeysPkc(dict):
|
|
631
591
|
@pulumi.getter(name="allowReplaceKey")
|
632
592
|
def allow_replace_key(self) -> Optional[bool]:
|
633
593
|
"""
|
634
|
-
Controls the ability for Vault to replace through
|
635
|
-
generation or importing a key into the configured backend even
|
636
|
-
if a key is present, if set to `false` those operations are forbidden
|
637
|
-
if a key exists.
|
594
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
638
595
|
"""
|
639
596
|
return pulumi.get(self, "allow_replace_key")
|
640
597
|
|
@@ -642,8 +599,7 @@ class KeysPkc(dict):
|
|
642
599
|
@pulumi.getter(name="allowStoreKey")
|
643
600
|
def allow_store_key(self) -> Optional[bool]:
|
644
601
|
"""
|
645
|
-
Controls the ability for Vault to import a key to the
|
646
|
-
configured backend, if `false`, those operations will be forbidden.
|
602
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
647
603
|
"""
|
648
604
|
return pulumi.get(self, "allow_store_key")
|
649
605
|
|
@@ -651,8 +607,7 @@ class KeysPkc(dict):
|
|
651
607
|
@pulumi.getter(name="anyMount")
|
652
608
|
def any_mount(self) -> Optional[bool]:
|
653
609
|
"""
|
654
|
-
|
655
|
-
namespace.
|
610
|
+
Allow usage from any mount point within the namespace if 'true'
|
656
611
|
"""
|
657
612
|
return pulumi.get(self, "any_mount")
|
658
613
|
|
@@ -660,8 +615,7 @@ class KeysPkc(dict):
|
|
660
615
|
@pulumi.getter
|
661
616
|
def curve(self) -> Optional[str]:
|
662
617
|
"""
|
663
|
-
|
664
|
-
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
618
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
665
619
|
"""
|
666
620
|
return pulumi.get(self, "curve")
|
667
621
|
|
@@ -669,8 +623,7 @@ class KeysPkc(dict):
|
|
669
623
|
@pulumi.getter(name="forceRwSession")
|
670
624
|
def force_rw_session(self) -> Optional[str]:
|
671
625
|
"""
|
672
|
-
Force all operations to open up a read-write session to
|
673
|
-
the HSM.
|
626
|
+
Force all operations to open up a read-write session to the HSM
|
674
627
|
"""
|
675
628
|
return pulumi.get(self, "force_rw_session")
|
676
629
|
|
@@ -678,7 +631,7 @@ class KeysPkc(dict):
|
|
678
631
|
@pulumi.getter(name="keyBits")
|
679
632
|
def key_bits(self) -> Optional[str]:
|
680
633
|
"""
|
681
|
-
|
634
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
682
635
|
"""
|
683
636
|
return pulumi.get(self, "key_bits")
|
684
637
|
|
@@ -686,8 +639,7 @@ class KeysPkc(dict):
|
|
686
639
|
@pulumi.getter
|
687
640
|
def slot(self) -> Optional[str]:
|
688
641
|
"""
|
689
|
-
The slot number to use, specified as a string in a decimal format
|
690
|
-
(e.g. `2305843009213693953`).
|
642
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
691
643
|
"""
|
692
644
|
return pulumi.get(self, "slot")
|
693
645
|
|
@@ -695,7 +647,7 @@ class KeysPkc(dict):
|
|
695
647
|
@pulumi.getter(name="tokenLabel")
|
696
648
|
def token_label(self) -> Optional[str]:
|
697
649
|
"""
|
698
|
-
The slot token label to use
|
650
|
+
The slot token label to use
|
699
651
|
"""
|
700
652
|
return pulumi.get(self, "token_label")
|
701
653
|
|
pulumi_vault/mfa_duo.py
CHANGED
@@ -328,7 +328,6 @@ class MfaDuo(pulumi.CustomResource):
|
|
328
328
|
|
329
329
|
## Example Usage
|
330
330
|
|
331
|
-
<!--Start PulumiCodeChooser -->
|
332
331
|
```python
|
333
332
|
import pulumi
|
334
333
|
import pulumi_vault as vault
|
@@ -343,7 +342,6 @@ class MfaDuo(pulumi.CustomResource):
|
|
343
342
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
344
343
|
api_hostname="api-2b5c39f5.duosecurity.com")
|
345
344
|
```
|
346
|
-
<!--End PulumiCodeChooser -->
|
347
345
|
|
348
346
|
## Import
|
349
347
|
|
@@ -384,7 +382,6 @@ class MfaDuo(pulumi.CustomResource):
|
|
384
382
|
|
385
383
|
## Example Usage
|
386
384
|
|
387
|
-
<!--Start PulumiCodeChooser -->
|
388
385
|
```python
|
389
386
|
import pulumi
|
390
387
|
import pulumi_vault as vault
|
@@ -399,7 +396,6 @@ class MfaDuo(pulumi.CustomResource):
|
|
399
396
|
integration_key="BIACEUEAXI20BNWTEYXT",
|
400
397
|
api_hostname="api-2b5c39f5.duosecurity.com")
|
401
398
|
```
|
402
|
-
<!--End PulumiCodeChooser -->
|
403
399
|
|
404
400
|
## Import
|
405
401
|
|
pulumi_vault/mfa_okta.py
CHANGED
@@ -349,7 +349,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
349
349
|
|
350
350
|
## Example Usage
|
351
351
|
|
352
|
-
<!--Start PulumiCodeChooser -->
|
353
352
|
```python
|
354
353
|
import pulumi
|
355
354
|
import pulumi_vault as vault
|
@@ -364,7 +363,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
364
363
|
org_name="hashicorp",
|
365
364
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
366
365
|
```
|
367
|
-
<!--End PulumiCodeChooser -->
|
368
366
|
|
369
367
|
## Import
|
370
368
|
|
@@ -410,7 +408,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
410
408
|
|
411
409
|
## Example Usage
|
412
410
|
|
413
|
-
<!--Start PulumiCodeChooser -->
|
414
411
|
```python
|
415
412
|
import pulumi
|
416
413
|
import pulumi_vault as vault
|
@@ -425,7 +422,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
425
422
|
org_name="hashicorp",
|
426
423
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
427
424
|
```
|
428
|
-
<!--End PulumiCodeChooser -->
|
429
425
|
|
430
426
|
## Import
|
431
427
|
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -359,7 +359,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
359
359
|
|
360
360
|
## Example Usage
|
361
361
|
|
362
|
-
<!--Start PulumiCodeChooser -->
|
363
362
|
```python
|
364
363
|
import pulumi
|
365
364
|
import pulumi_vault as vault
|
@@ -375,7 +374,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
375
374
|
username_format="user@example.com",
|
376
375
|
settings_file_base64=settings_file)
|
377
376
|
```
|
378
|
-
<!--End PulumiCodeChooser -->
|
379
377
|
|
380
378
|
## Import
|
381
379
|
|
@@ -417,7 +415,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
417
415
|
|
418
416
|
## Example Usage
|
419
417
|
|
420
|
-
<!--Start PulumiCodeChooser -->
|
421
418
|
```python
|
422
419
|
import pulumi
|
423
420
|
import pulumi_vault as vault
|
@@ -433,7 +430,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
433
430
|
username_format="user@example.com",
|
434
431
|
settings_file_base64=settings_file)
|
435
432
|
```
|
436
|
-
<!--End PulumiCodeChooser -->
|
437
433
|
|
438
434
|
## Import
|
439
435
|
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -360,7 +360,6 @@ class MfaTotp(pulumi.CustomResource):
|
|
360
360
|
|
361
361
|
## Example Usage
|
362
362
|
|
363
|
-
<!--Start PulumiCodeChooser -->
|
364
363
|
```python
|
365
364
|
import pulumi
|
366
365
|
import pulumi_vault as vault
|
@@ -373,7 +372,6 @@ class MfaTotp(pulumi.CustomResource):
|
|
373
372
|
digits=8,
|
374
373
|
key_size=20)
|
375
374
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
375
|
|
378
376
|
## Import
|
379
377
|
|
@@ -414,7 +412,6 @@ class MfaTotp(pulumi.CustomResource):
|
|
414
412
|
|
415
413
|
## Example Usage
|
416
414
|
|
417
|
-
<!--Start PulumiCodeChooser -->
|
418
415
|
```python
|
419
416
|
import pulumi
|
420
417
|
import pulumi_vault as vault
|
@@ -427,7 +424,6 @@ class MfaTotp(pulumi.CustomResource):
|
|
427
424
|
digits=8,
|
428
425
|
key_size=20)
|
429
426
|
```
|
430
|
-
<!--End PulumiCodeChooser -->
|
431
427
|
|
432
428
|
## Import
|
433
429
|
|