pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -56,35 +57,35 @@ class KeysAw(dict):
56
57
  return super().get(key, default)
57
58
 
58
59
  def __init__(__self__, *,
59
- access_key: str,
60
- key_bits: str,
61
- key_type: str,
62
- kms_key: str,
63
- name: str,
64
- secret_key: str,
65
- allow_generate_key: Optional[bool] = None,
66
- allow_replace_key: Optional[bool] = None,
67
- allow_store_key: Optional[bool] = None,
68
- any_mount: Optional[bool] = None,
69
- curve: Optional[str] = None,
70
- endpoint: Optional[str] = None,
71
- region: Optional[str] = None,
72
- uuid: Optional[str] = None):
73
- """
74
- :param str access_key: The AWS access key to use
75
- :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
76
- :param str key_type: The type of key to use
77
- :param str kms_key: An identifier for the key
78
- :param str name: A unique lowercase name that serves as identifying the key
79
- :param str secret_key: The AWS secret key to use
80
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
81
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
82
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
83
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
84
- :param str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
85
- :param str endpoint: Used to specify a custom AWS endpoint
86
- :param str region: The AWS region where the keys are stored (or will be stored)
87
- :param str uuid: ID of the managed key read from Vault
60
+ access_key: builtins.str,
61
+ key_bits: builtins.str,
62
+ key_type: builtins.str,
63
+ kms_key: builtins.str,
64
+ name: builtins.str,
65
+ secret_key: builtins.str,
66
+ allow_generate_key: Optional[builtins.bool] = None,
67
+ allow_replace_key: Optional[builtins.bool] = None,
68
+ allow_store_key: Optional[builtins.bool] = None,
69
+ any_mount: Optional[builtins.bool] = None,
70
+ curve: Optional[builtins.str] = None,
71
+ endpoint: Optional[builtins.str] = None,
72
+ region: Optional[builtins.str] = None,
73
+ uuid: Optional[builtins.str] = None):
74
+ """
75
+ :param builtins.str access_key: The AWS access key to use
76
+ :param builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
77
+ :param builtins.str key_type: The type of key to use
78
+ :param builtins.str kms_key: An identifier for the key
79
+ :param builtins.str name: A unique lowercase name that serves as identifying the key
80
+ :param builtins.str secret_key: The AWS secret key to use
81
+ :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
82
+ :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
83
+ :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
84
+ :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
85
+ :param builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
86
+ :param builtins.str endpoint: Used to specify a custom AWS endpoint
87
+ :param builtins.str region: The AWS region where the keys are stored (or will be stored)
88
+ :param builtins.str uuid: ID of the managed key read from Vault
88
89
  """
89
90
  pulumi.set(__self__, "access_key", access_key)
90
91
  pulumi.set(__self__, "key_bits", key_bits)
@@ -111,7 +112,7 @@ class KeysAw(dict):
111
112
 
112
113
  @property
113
114
  @pulumi.getter(name="accessKey")
114
- def access_key(self) -> str:
115
+ def access_key(self) -> builtins.str:
115
116
  """
116
117
  The AWS access key to use
117
118
  """
@@ -119,7 +120,7 @@ class KeysAw(dict):
119
120
 
120
121
  @property
121
122
  @pulumi.getter(name="keyBits")
122
- def key_bits(self) -> str:
123
+ def key_bits(self) -> builtins.str:
123
124
  """
124
125
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
125
126
  """
@@ -127,7 +128,7 @@ class KeysAw(dict):
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="keyType")
130
- def key_type(self) -> str:
131
+ def key_type(self) -> builtins.str:
131
132
  """
132
133
  The type of key to use
133
134
  """
@@ -135,7 +136,7 @@ class KeysAw(dict):
135
136
 
136
137
  @property
137
138
  @pulumi.getter(name="kmsKey")
138
- def kms_key(self) -> str:
139
+ def kms_key(self) -> builtins.str:
139
140
  """
140
141
  An identifier for the key
141
142
  """
@@ -143,7 +144,7 @@ class KeysAw(dict):
143
144
 
144
145
  @property
145
146
  @pulumi.getter
146
- def name(self) -> str:
147
+ def name(self) -> builtins.str:
147
148
  """
148
149
  A unique lowercase name that serves as identifying the key
149
150
  """
@@ -151,7 +152,7 @@ class KeysAw(dict):
151
152
 
152
153
  @property
153
154
  @pulumi.getter(name="secretKey")
154
- def secret_key(self) -> str:
155
+ def secret_key(self) -> builtins.str:
155
156
  """
156
157
  The AWS secret key to use
157
158
  """
@@ -159,7 +160,7 @@ class KeysAw(dict):
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="allowGenerateKey")
162
- def allow_generate_key(self) -> Optional[bool]:
163
+ def allow_generate_key(self) -> Optional[builtins.bool]:
163
164
  """
164
165
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
165
166
  """
@@ -167,7 +168,7 @@ class KeysAw(dict):
167
168
 
168
169
  @property
169
170
  @pulumi.getter(name="allowReplaceKey")
170
- def allow_replace_key(self) -> Optional[bool]:
171
+ def allow_replace_key(self) -> Optional[builtins.bool]:
171
172
  """
172
173
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
173
174
  """
@@ -175,7 +176,7 @@ class KeysAw(dict):
175
176
 
176
177
  @property
177
178
  @pulumi.getter(name="allowStoreKey")
178
- def allow_store_key(self) -> Optional[bool]:
179
+ def allow_store_key(self) -> Optional[builtins.bool]:
179
180
  """
180
181
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
181
182
  """
@@ -183,7 +184,7 @@ class KeysAw(dict):
183
184
 
184
185
  @property
185
186
  @pulumi.getter(name="anyMount")
186
- def any_mount(self) -> Optional[bool]:
187
+ def any_mount(self) -> Optional[builtins.bool]:
187
188
  """
188
189
  Allow usage from any mount point within the namespace if 'true'
189
190
  """
@@ -191,7 +192,7 @@ class KeysAw(dict):
191
192
 
192
193
  @property
193
194
  @pulumi.getter
194
- def curve(self) -> Optional[str]:
195
+ def curve(self) -> Optional[builtins.str]:
195
196
  """
196
197
  The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
197
198
  """
@@ -199,7 +200,7 @@ class KeysAw(dict):
199
200
 
200
201
  @property
201
202
  @pulumi.getter
202
- def endpoint(self) -> Optional[str]:
203
+ def endpoint(self) -> Optional[builtins.str]:
203
204
  """
204
205
  Used to specify a custom AWS endpoint
205
206
  """
@@ -207,7 +208,7 @@ class KeysAw(dict):
207
208
 
208
209
  @property
209
210
  @pulumi.getter
210
- def region(self) -> Optional[str]:
211
+ def region(self) -> Optional[builtins.str]:
211
212
  """
212
213
  The AWS region where the keys are stored (or will be stored)
213
214
  """
@@ -215,7 +216,7 @@ class KeysAw(dict):
215
216
 
216
217
  @property
217
218
  @pulumi.getter
218
- def uuid(self) -> Optional[str]:
219
+ def uuid(self) -> Optional[builtins.str]:
219
220
  """
220
221
  ID of the managed key read from Vault
221
222
  """
@@ -262,37 +263,37 @@ class KeysAzure(dict):
262
263
  return super().get(key, default)
263
264
 
264
265
  def __init__(__self__, *,
265
- client_id: str,
266
- client_secret: str,
267
- key_name: str,
268
- key_type: str,
269
- name: str,
270
- tenant_id: str,
271
- vault_name: str,
272
- allow_generate_key: Optional[bool] = None,
273
- allow_replace_key: Optional[bool] = None,
274
- allow_store_key: Optional[bool] = None,
275
- any_mount: Optional[bool] = None,
276
- environment: Optional[str] = None,
277
- key_bits: Optional[str] = None,
278
- resource: Optional[str] = None,
279
- uuid: Optional[str] = None):
280
- """
281
- :param str client_id: The client id for credentials to query the Azure APIs
282
- :param str client_secret: The client secret for credentials to query the Azure APIs
283
- :param str key_name: The Key Vault key to use for encryption and decryption
284
- :param str key_type: The type of key to use
285
- :param str name: A unique lowercase name that serves as identifying the key
286
- :param str tenant_id: The tenant id for the Azure Active Directory organization
287
- :param str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
288
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
289
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
290
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
291
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
292
- :param str environment: The Azure Cloud environment API endpoints to use
293
- :param str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
294
- :param str resource: The Azure Key Vault resource's DNS Suffix to connect to
295
- :param str uuid: ID of the managed key read from Vault
266
+ client_id: builtins.str,
267
+ client_secret: builtins.str,
268
+ key_name: builtins.str,
269
+ key_type: builtins.str,
270
+ name: builtins.str,
271
+ tenant_id: builtins.str,
272
+ vault_name: builtins.str,
273
+ allow_generate_key: Optional[builtins.bool] = None,
274
+ allow_replace_key: Optional[builtins.bool] = None,
275
+ allow_store_key: Optional[builtins.bool] = None,
276
+ any_mount: Optional[builtins.bool] = None,
277
+ environment: Optional[builtins.str] = None,
278
+ key_bits: Optional[builtins.str] = None,
279
+ resource: Optional[builtins.str] = None,
280
+ uuid: Optional[builtins.str] = None):
281
+ """
282
+ :param builtins.str client_id: The client id for credentials to query the Azure APIs
283
+ :param builtins.str client_secret: The client secret for credentials to query the Azure APIs
284
+ :param builtins.str key_name: The Key Vault key to use for encryption and decryption
285
+ :param builtins.str key_type: The type of key to use
286
+ :param builtins.str name: A unique lowercase name that serves as identifying the key
287
+ :param builtins.str tenant_id: The tenant id for the Azure Active Directory organization
288
+ :param builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
289
+ :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
290
+ :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
291
+ :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
292
+ :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
293
+ :param builtins.str environment: The Azure Cloud environment API endpoints to use
294
+ :param builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
295
+ :param builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
296
+ :param builtins.str uuid: ID of the managed key read from Vault
296
297
  """
297
298
  pulumi.set(__self__, "client_id", client_id)
298
299
  pulumi.set(__self__, "client_secret", client_secret)
@@ -320,7 +321,7 @@ class KeysAzure(dict):
320
321
 
321
322
  @property
322
323
  @pulumi.getter(name="clientId")
323
- def client_id(self) -> str:
324
+ def client_id(self) -> builtins.str:
324
325
  """
325
326
  The client id for credentials to query the Azure APIs
326
327
  """
@@ -328,7 +329,7 @@ class KeysAzure(dict):
328
329
 
329
330
  @property
330
331
  @pulumi.getter(name="clientSecret")
331
- def client_secret(self) -> str:
332
+ def client_secret(self) -> builtins.str:
332
333
  """
333
334
  The client secret for credentials to query the Azure APIs
334
335
  """
@@ -336,7 +337,7 @@ class KeysAzure(dict):
336
337
 
337
338
  @property
338
339
  @pulumi.getter(name="keyName")
339
- def key_name(self) -> str:
340
+ def key_name(self) -> builtins.str:
340
341
  """
341
342
  The Key Vault key to use for encryption and decryption
342
343
  """
@@ -344,7 +345,7 @@ class KeysAzure(dict):
344
345
 
345
346
  @property
346
347
  @pulumi.getter(name="keyType")
347
- def key_type(self) -> str:
348
+ def key_type(self) -> builtins.str:
348
349
  """
349
350
  The type of key to use
350
351
  """
@@ -352,7 +353,7 @@ class KeysAzure(dict):
352
353
 
353
354
  @property
354
355
  @pulumi.getter
355
- def name(self) -> str:
356
+ def name(self) -> builtins.str:
356
357
  """
357
358
  A unique lowercase name that serves as identifying the key
358
359
  """
@@ -360,7 +361,7 @@ class KeysAzure(dict):
360
361
 
361
362
  @property
362
363
  @pulumi.getter(name="tenantId")
363
- def tenant_id(self) -> str:
364
+ def tenant_id(self) -> builtins.str:
364
365
  """
365
366
  The tenant id for the Azure Active Directory organization
366
367
  """
@@ -368,7 +369,7 @@ class KeysAzure(dict):
368
369
 
369
370
  @property
370
371
  @pulumi.getter(name="vaultName")
371
- def vault_name(self) -> str:
372
+ def vault_name(self) -> builtins.str:
372
373
  """
373
374
  The Key Vault vault to use the encryption keys for encryption and decryption
374
375
  """
@@ -376,7 +377,7 @@ class KeysAzure(dict):
376
377
 
377
378
  @property
378
379
  @pulumi.getter(name="allowGenerateKey")
379
- def allow_generate_key(self) -> Optional[bool]:
380
+ def allow_generate_key(self) -> Optional[builtins.bool]:
380
381
  """
381
382
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
382
383
  """
@@ -384,7 +385,7 @@ class KeysAzure(dict):
384
385
 
385
386
  @property
386
387
  @pulumi.getter(name="allowReplaceKey")
387
- def allow_replace_key(self) -> Optional[bool]:
388
+ def allow_replace_key(self) -> Optional[builtins.bool]:
388
389
  """
389
390
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
390
391
  """
@@ -392,7 +393,7 @@ class KeysAzure(dict):
392
393
 
393
394
  @property
394
395
  @pulumi.getter(name="allowStoreKey")
395
- def allow_store_key(self) -> Optional[bool]:
396
+ def allow_store_key(self) -> Optional[builtins.bool]:
396
397
  """
397
398
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
398
399
  """
@@ -400,7 +401,7 @@ class KeysAzure(dict):
400
401
 
401
402
  @property
402
403
  @pulumi.getter(name="anyMount")
403
- def any_mount(self) -> Optional[bool]:
404
+ def any_mount(self) -> Optional[builtins.bool]:
404
405
  """
405
406
  Allow usage from any mount point within the namespace if 'true'
406
407
  """
@@ -408,7 +409,7 @@ class KeysAzure(dict):
408
409
 
409
410
  @property
410
411
  @pulumi.getter
411
- def environment(self) -> Optional[str]:
412
+ def environment(self) -> Optional[builtins.str]:
412
413
  """
413
414
  The Azure Cloud environment API endpoints to use
414
415
  """
@@ -416,7 +417,7 @@ class KeysAzure(dict):
416
417
 
417
418
  @property
418
419
  @pulumi.getter(name="keyBits")
419
- def key_bits(self) -> Optional[str]:
420
+ def key_bits(self) -> Optional[builtins.str]:
420
421
  """
421
422
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
422
423
  """
@@ -424,7 +425,7 @@ class KeysAzure(dict):
424
425
 
425
426
  @property
426
427
  @pulumi.getter
427
- def resource(self) -> Optional[str]:
428
+ def resource(self) -> Optional[builtins.str]:
428
429
  """
429
430
  The Azure Key Vault resource's DNS Suffix to connect to
430
431
  """
@@ -432,7 +433,7 @@ class KeysAzure(dict):
432
433
 
433
434
  @property
434
435
  @pulumi.getter
435
- def uuid(self) -> Optional[str]:
436
+ def uuid(self) -> Optional[builtins.str]:
436
437
  """
437
438
  ID of the managed key read from Vault
438
439
  """
@@ -475,39 +476,39 @@ class KeysPkc(dict):
475
476
  return super().get(key, default)
476
477
 
477
478
  def __init__(__self__, *,
478
- key_id: str,
479
- key_label: str,
480
- library: str,
481
- mechanism: str,
482
- name: str,
483
- pin: str,
484
- allow_generate_key: Optional[bool] = None,
485
- allow_replace_key: Optional[bool] = None,
486
- allow_store_key: Optional[bool] = None,
487
- any_mount: Optional[bool] = None,
488
- curve: Optional[str] = None,
489
- force_rw_session: Optional[str] = None,
490
- key_bits: Optional[str] = None,
491
- slot: Optional[str] = None,
492
- token_label: Optional[str] = None,
493
- uuid: Optional[str] = None):
494
- """
495
- :param str key_id: The id of a PKCS#11 key to use
496
- :param str key_label: The label of the key to use
497
- :param str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
498
- :param str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
499
- :param str name: A unique lowercase name that serves as identifying the key
500
- :param str pin: The PIN for login
501
- :param bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
502
- :param bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
503
- :param bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
504
- :param bool any_mount: Allow usage from any mount point within the namespace if 'true'
505
- :param str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
506
- :param str force_rw_session: Force all operations to open up a read-write session to the HSM
507
- :param str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
508
- :param str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
509
- :param str token_label: The slot token label to use
510
- :param str uuid: ID of the managed key read from Vault
479
+ key_id: builtins.str,
480
+ key_label: builtins.str,
481
+ library: builtins.str,
482
+ mechanism: builtins.str,
483
+ name: builtins.str,
484
+ pin: builtins.str,
485
+ allow_generate_key: Optional[builtins.bool] = None,
486
+ allow_replace_key: Optional[builtins.bool] = None,
487
+ allow_store_key: Optional[builtins.bool] = None,
488
+ any_mount: Optional[builtins.bool] = None,
489
+ curve: Optional[builtins.str] = None,
490
+ force_rw_session: Optional[builtins.str] = None,
491
+ key_bits: Optional[builtins.str] = None,
492
+ slot: Optional[builtins.str] = None,
493
+ token_label: Optional[builtins.str] = None,
494
+ uuid: Optional[builtins.str] = None):
495
+ """
496
+ :param builtins.str key_id: The id of a PKCS#11 key to use
497
+ :param builtins.str key_label: The label of the key to use
498
+ :param builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
499
+ :param builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
500
+ :param builtins.str name: A unique lowercase name that serves as identifying the key
501
+ :param builtins.str pin: The PIN for login
502
+ :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
503
+ :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
504
+ :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
505
+ :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
506
+ :param builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
507
+ :param builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
508
+ :param builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
509
+ :param builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
510
+ :param builtins.str token_label: The slot token label to use
511
+ :param builtins.str uuid: ID of the managed key read from Vault
511
512
  """
512
513
  pulumi.set(__self__, "key_id", key_id)
513
514
  pulumi.set(__self__, "key_label", key_label)
@@ -538,7 +539,7 @@ class KeysPkc(dict):
538
539
 
539
540
  @property
540
541
  @pulumi.getter(name="keyId")
541
- def key_id(self) -> str:
542
+ def key_id(self) -> builtins.str:
542
543
  """
543
544
  The id of a PKCS#11 key to use
544
545
  """
@@ -546,7 +547,7 @@ class KeysPkc(dict):
546
547
 
547
548
  @property
548
549
  @pulumi.getter(name="keyLabel")
549
- def key_label(self) -> str:
550
+ def key_label(self) -> builtins.str:
550
551
  """
551
552
  The label of the key to use
552
553
  """
@@ -554,7 +555,7 @@ class KeysPkc(dict):
554
555
 
555
556
  @property
556
557
  @pulumi.getter
557
- def library(self) -> str:
558
+ def library(self) -> builtins.str:
558
559
  """
559
560
  The name of the kms_library stanza to use from Vault's config to lookup the local library path
560
561
  """
@@ -562,7 +563,7 @@ class KeysPkc(dict):
562
563
 
563
564
  @property
564
565
  @pulumi.getter
565
- def mechanism(self) -> str:
566
+ def mechanism(self) -> builtins.str:
566
567
  """
567
568
  The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
568
569
  """
@@ -570,7 +571,7 @@ class KeysPkc(dict):
570
571
 
571
572
  @property
572
573
  @pulumi.getter
573
- def name(self) -> str:
574
+ def name(self) -> builtins.str:
574
575
  """
575
576
  A unique lowercase name that serves as identifying the key
576
577
  """
@@ -578,7 +579,7 @@ class KeysPkc(dict):
578
579
 
579
580
  @property
580
581
  @pulumi.getter
581
- def pin(self) -> str:
582
+ def pin(self) -> builtins.str:
582
583
  """
583
584
  The PIN for login
584
585
  """
@@ -586,7 +587,7 @@ class KeysPkc(dict):
586
587
 
587
588
  @property
588
589
  @pulumi.getter(name="allowGenerateKey")
589
- def allow_generate_key(self) -> Optional[bool]:
590
+ def allow_generate_key(self) -> Optional[builtins.bool]:
590
591
  """
591
592
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
592
593
  """
@@ -594,7 +595,7 @@ class KeysPkc(dict):
594
595
 
595
596
  @property
596
597
  @pulumi.getter(name="allowReplaceKey")
597
- def allow_replace_key(self) -> Optional[bool]:
598
+ def allow_replace_key(self) -> Optional[builtins.bool]:
598
599
  """
599
600
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
600
601
  """
@@ -602,7 +603,7 @@ class KeysPkc(dict):
602
603
 
603
604
  @property
604
605
  @pulumi.getter(name="allowStoreKey")
605
- def allow_store_key(self) -> Optional[bool]:
606
+ def allow_store_key(self) -> Optional[builtins.bool]:
606
607
  """
607
608
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
608
609
  """
@@ -610,7 +611,7 @@ class KeysPkc(dict):
610
611
 
611
612
  @property
612
613
  @pulumi.getter(name="anyMount")
613
- def any_mount(self) -> Optional[bool]:
614
+ def any_mount(self) -> Optional[builtins.bool]:
614
615
  """
615
616
  Allow usage from any mount point within the namespace if 'true'
616
617
  """
@@ -618,7 +619,7 @@ class KeysPkc(dict):
618
619
 
619
620
  @property
620
621
  @pulumi.getter
621
- def curve(self) -> Optional[str]:
622
+ def curve(self) -> Optional[builtins.str]:
622
623
  """
623
624
  Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
624
625
  """
@@ -626,7 +627,7 @@ class KeysPkc(dict):
626
627
 
627
628
  @property
628
629
  @pulumi.getter(name="forceRwSession")
629
- def force_rw_session(self) -> Optional[str]:
630
+ def force_rw_session(self) -> Optional[builtins.str]:
630
631
  """
631
632
  Force all operations to open up a read-write session to the HSM
632
633
  """
@@ -634,7 +635,7 @@ class KeysPkc(dict):
634
635
 
635
636
  @property
636
637
  @pulumi.getter(name="keyBits")
637
- def key_bits(self) -> Optional[str]:
638
+ def key_bits(self) -> Optional[builtins.str]:
638
639
  """
639
640
  Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
640
641
  """
@@ -642,7 +643,7 @@ class KeysPkc(dict):
642
643
 
643
644
  @property
644
645
  @pulumi.getter
645
- def slot(self) -> Optional[str]:
646
+ def slot(self) -> Optional[builtins.str]:
646
647
  """
647
648
  The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
648
649
  """
@@ -650,7 +651,7 @@ class KeysPkc(dict):
650
651
 
651
652
  @property
652
653
  @pulumi.getter(name="tokenLabel")
653
- def token_label(self) -> Optional[str]:
654
+ def token_label(self) -> Optional[builtins.str]:
654
655
  """
655
656
  The slot token label to use
656
657
  """
@@ -658,7 +659,7 @@ class KeysPkc(dict):
658
659
 
659
660
  @property
660
661
  @pulumi.getter
661
- def uuid(self) -> Optional[str]:
662
+ def uuid(self) -> Optional[builtins.str]:
662
663
  """
663
664
  ID of the managed key read from Vault
664
665
  """