pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -57,35 +56,35 @@ class KeysAw(dict):
|
|
57
56
|
return super().get(key, default)
|
58
57
|
|
59
58
|
def __init__(__self__, *,
|
60
|
-
access_key:
|
61
|
-
key_bits:
|
62
|
-
key_type:
|
63
|
-
kms_key:
|
64
|
-
name:
|
65
|
-
secret_key:
|
66
|
-
allow_generate_key: Optional[
|
67
|
-
allow_replace_key: Optional[
|
68
|
-
allow_store_key: Optional[
|
69
|
-
any_mount: Optional[
|
70
|
-
curve: Optional[
|
71
|
-
endpoint: Optional[
|
72
|
-
region: Optional[
|
73
|
-
uuid: Optional[
|
74
|
-
"""
|
75
|
-
:param
|
76
|
-
:param
|
77
|
-
:param
|
78
|
-
:param
|
79
|
-
:param
|
80
|
-
:param
|
81
|
-
:param
|
82
|
-
:param
|
83
|
-
:param
|
84
|
-
:param
|
85
|
-
:param
|
86
|
-
:param
|
87
|
-
:param
|
88
|
-
:param
|
59
|
+
access_key: _builtins.str,
|
60
|
+
key_bits: _builtins.str,
|
61
|
+
key_type: _builtins.str,
|
62
|
+
kms_key: _builtins.str,
|
63
|
+
name: _builtins.str,
|
64
|
+
secret_key: _builtins.str,
|
65
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
66
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
67
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
68
|
+
any_mount: Optional[_builtins.bool] = None,
|
69
|
+
curve: Optional[_builtins.str] = None,
|
70
|
+
endpoint: Optional[_builtins.str] = None,
|
71
|
+
region: Optional[_builtins.str] = None,
|
72
|
+
uuid: Optional[_builtins.str] = None):
|
73
|
+
"""
|
74
|
+
:param _builtins.str access_key: The AWS access key to use
|
75
|
+
:param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
76
|
+
:param _builtins.str key_type: The type of key to use
|
77
|
+
:param _builtins.str kms_key: An identifier for the key
|
78
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
79
|
+
:param _builtins.str secret_key: The AWS secret key to use
|
80
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
81
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
82
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
83
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
84
|
+
:param _builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
85
|
+
:param _builtins.str endpoint: Used to specify a custom AWS endpoint
|
86
|
+
:param _builtins.str region: The AWS region where the keys are stored (or will be stored)
|
87
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
89
88
|
"""
|
90
89
|
pulumi.set(__self__, "access_key", access_key)
|
91
90
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -110,113 +109,113 @@ class KeysAw(dict):
|
|
110
109
|
if uuid is not None:
|
111
110
|
pulumi.set(__self__, "uuid", uuid)
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter(name="accessKey")
|
115
|
-
def access_key(self) ->
|
114
|
+
def access_key(self) -> _builtins.str:
|
116
115
|
"""
|
117
116
|
The AWS access key to use
|
118
117
|
"""
|
119
118
|
return pulumi.get(self, "access_key")
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter(name="keyBits")
|
123
|
-
def key_bits(self) ->
|
122
|
+
def key_bits(self) -> _builtins.str:
|
124
123
|
"""
|
125
124
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
126
125
|
"""
|
127
126
|
return pulumi.get(self, "key_bits")
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="keyType")
|
131
|
-
def key_type(self) ->
|
130
|
+
def key_type(self) -> _builtins.str:
|
132
131
|
"""
|
133
132
|
The type of key to use
|
134
133
|
"""
|
135
134
|
return pulumi.get(self, "key_type")
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter(name="kmsKey")
|
139
|
-
def kms_key(self) ->
|
138
|
+
def kms_key(self) -> _builtins.str:
|
140
139
|
"""
|
141
140
|
An identifier for the key
|
142
141
|
"""
|
143
142
|
return pulumi.get(self, "kms_key")
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter
|
147
|
-
def name(self) ->
|
146
|
+
def name(self) -> _builtins.str:
|
148
147
|
"""
|
149
148
|
A unique lowercase name that serves as identifying the key
|
150
149
|
"""
|
151
150
|
return pulumi.get(self, "name")
|
152
151
|
|
153
|
-
@property
|
152
|
+
@_builtins.property
|
154
153
|
@pulumi.getter(name="secretKey")
|
155
|
-
def secret_key(self) ->
|
154
|
+
def secret_key(self) -> _builtins.str:
|
156
155
|
"""
|
157
156
|
The AWS secret key to use
|
158
157
|
"""
|
159
158
|
return pulumi.get(self, "secret_key")
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="allowGenerateKey")
|
163
|
-
def allow_generate_key(self) -> Optional[
|
162
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
164
163
|
"""
|
165
164
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "allow_generate_key")
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
@pulumi.getter(name="allowReplaceKey")
|
171
|
-
def allow_replace_key(self) -> Optional[
|
170
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
172
171
|
"""
|
173
172
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
174
173
|
"""
|
175
174
|
return pulumi.get(self, "allow_replace_key")
|
176
175
|
|
177
|
-
@property
|
176
|
+
@_builtins.property
|
178
177
|
@pulumi.getter(name="allowStoreKey")
|
179
|
-
def allow_store_key(self) -> Optional[
|
178
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
180
179
|
"""
|
181
180
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
182
181
|
"""
|
183
182
|
return pulumi.get(self, "allow_store_key")
|
184
183
|
|
185
|
-
@property
|
184
|
+
@_builtins.property
|
186
185
|
@pulumi.getter(name="anyMount")
|
187
|
-
def any_mount(self) -> Optional[
|
186
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
188
187
|
"""
|
189
188
|
Allow usage from any mount point within the namespace if 'true'
|
190
189
|
"""
|
191
190
|
return pulumi.get(self, "any_mount")
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter
|
195
|
-
def curve(self) -> Optional[
|
194
|
+
def curve(self) -> Optional[_builtins.str]:
|
196
195
|
"""
|
197
196
|
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
198
197
|
"""
|
199
198
|
return pulumi.get(self, "curve")
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter
|
203
|
-
def endpoint(self) -> Optional[
|
202
|
+
def endpoint(self) -> Optional[_builtins.str]:
|
204
203
|
"""
|
205
204
|
Used to specify a custom AWS endpoint
|
206
205
|
"""
|
207
206
|
return pulumi.get(self, "endpoint")
|
208
207
|
|
209
|
-
@property
|
208
|
+
@_builtins.property
|
210
209
|
@pulumi.getter
|
211
|
-
def region(self) -> Optional[
|
210
|
+
def region(self) -> Optional[_builtins.str]:
|
212
211
|
"""
|
213
212
|
The AWS region where the keys are stored (or will be stored)
|
214
213
|
"""
|
215
214
|
return pulumi.get(self, "region")
|
216
215
|
|
217
|
-
@property
|
216
|
+
@_builtins.property
|
218
217
|
@pulumi.getter
|
219
|
-
def uuid(self) -> Optional[
|
218
|
+
def uuid(self) -> Optional[_builtins.str]:
|
220
219
|
"""
|
221
220
|
ID of the managed key read from Vault
|
222
221
|
"""
|
@@ -263,37 +262,37 @@ class KeysAzure(dict):
|
|
263
262
|
return super().get(key, default)
|
264
263
|
|
265
264
|
def __init__(__self__, *,
|
266
|
-
client_id:
|
267
|
-
client_secret:
|
268
|
-
key_name:
|
269
|
-
key_type:
|
270
|
-
name:
|
271
|
-
tenant_id:
|
272
|
-
vault_name:
|
273
|
-
allow_generate_key: Optional[
|
274
|
-
allow_replace_key: Optional[
|
275
|
-
allow_store_key: Optional[
|
276
|
-
any_mount: Optional[
|
277
|
-
environment: Optional[
|
278
|
-
key_bits: Optional[
|
279
|
-
resource: Optional[
|
280
|
-
uuid: Optional[
|
281
|
-
"""
|
282
|
-
:param
|
283
|
-
:param
|
284
|
-
:param
|
285
|
-
:param
|
286
|
-
:param
|
287
|
-
:param
|
288
|
-
:param
|
289
|
-
:param
|
290
|
-
:param
|
291
|
-
:param
|
292
|
-
:param
|
293
|
-
:param
|
294
|
-
:param
|
295
|
-
:param
|
296
|
-
:param
|
265
|
+
client_id: _builtins.str,
|
266
|
+
client_secret: _builtins.str,
|
267
|
+
key_name: _builtins.str,
|
268
|
+
key_type: _builtins.str,
|
269
|
+
name: _builtins.str,
|
270
|
+
tenant_id: _builtins.str,
|
271
|
+
vault_name: _builtins.str,
|
272
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
273
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
274
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
275
|
+
any_mount: Optional[_builtins.bool] = None,
|
276
|
+
environment: Optional[_builtins.str] = None,
|
277
|
+
key_bits: Optional[_builtins.str] = None,
|
278
|
+
resource: Optional[_builtins.str] = None,
|
279
|
+
uuid: Optional[_builtins.str] = None):
|
280
|
+
"""
|
281
|
+
:param _builtins.str client_id: The client id for credentials to query the Azure APIs
|
282
|
+
:param _builtins.str client_secret: The client secret for credentials to query the Azure APIs
|
283
|
+
:param _builtins.str key_name: The Key Vault key to use for encryption and decryption
|
284
|
+
:param _builtins.str key_type: The type of key to use
|
285
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
286
|
+
:param _builtins.str tenant_id: The tenant id for the Azure Active Directory organization
|
287
|
+
:param _builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
288
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
289
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
290
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
291
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
292
|
+
:param _builtins.str environment: The Azure Cloud environment API endpoints to use
|
293
|
+
:param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
294
|
+
:param _builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
|
295
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
297
296
|
"""
|
298
297
|
pulumi.set(__self__, "client_id", client_id)
|
299
298
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -319,121 +318,121 @@ class KeysAzure(dict):
|
|
319
318
|
if uuid is not None:
|
320
319
|
pulumi.set(__self__, "uuid", uuid)
|
321
320
|
|
322
|
-
@property
|
321
|
+
@_builtins.property
|
323
322
|
@pulumi.getter(name="clientId")
|
324
|
-
def client_id(self) ->
|
323
|
+
def client_id(self) -> _builtins.str:
|
325
324
|
"""
|
326
325
|
The client id for credentials to query the Azure APIs
|
327
326
|
"""
|
328
327
|
return pulumi.get(self, "client_id")
|
329
328
|
|
330
|
-
@property
|
329
|
+
@_builtins.property
|
331
330
|
@pulumi.getter(name="clientSecret")
|
332
|
-
def client_secret(self) ->
|
331
|
+
def client_secret(self) -> _builtins.str:
|
333
332
|
"""
|
334
333
|
The client secret for credentials to query the Azure APIs
|
335
334
|
"""
|
336
335
|
return pulumi.get(self, "client_secret")
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="keyName")
|
340
|
-
def key_name(self) ->
|
339
|
+
def key_name(self) -> _builtins.str:
|
341
340
|
"""
|
342
341
|
The Key Vault key to use for encryption and decryption
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "key_name")
|
345
344
|
|
346
|
-
@property
|
345
|
+
@_builtins.property
|
347
346
|
@pulumi.getter(name="keyType")
|
348
|
-
def key_type(self) ->
|
347
|
+
def key_type(self) -> _builtins.str:
|
349
348
|
"""
|
350
349
|
The type of key to use
|
351
350
|
"""
|
352
351
|
return pulumi.get(self, "key_type")
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter
|
356
|
-
def name(self) ->
|
355
|
+
def name(self) -> _builtins.str:
|
357
356
|
"""
|
358
357
|
A unique lowercase name that serves as identifying the key
|
359
358
|
"""
|
360
359
|
return pulumi.get(self, "name")
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="tenantId")
|
364
|
-
def tenant_id(self) ->
|
363
|
+
def tenant_id(self) -> _builtins.str:
|
365
364
|
"""
|
366
365
|
The tenant id for the Azure Active Directory organization
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "tenant_id")
|
369
368
|
|
370
|
-
@property
|
369
|
+
@_builtins.property
|
371
370
|
@pulumi.getter(name="vaultName")
|
372
|
-
def vault_name(self) ->
|
371
|
+
def vault_name(self) -> _builtins.str:
|
373
372
|
"""
|
374
373
|
The Key Vault vault to use the encryption keys for encryption and decryption
|
375
374
|
"""
|
376
375
|
return pulumi.get(self, "vault_name")
|
377
376
|
|
378
|
-
@property
|
377
|
+
@_builtins.property
|
379
378
|
@pulumi.getter(name="allowGenerateKey")
|
380
|
-
def allow_generate_key(self) -> Optional[
|
379
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
381
380
|
"""
|
382
381
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
383
382
|
"""
|
384
383
|
return pulumi.get(self, "allow_generate_key")
|
385
384
|
|
386
|
-
@property
|
385
|
+
@_builtins.property
|
387
386
|
@pulumi.getter(name="allowReplaceKey")
|
388
|
-
def allow_replace_key(self) -> Optional[
|
387
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
389
388
|
"""
|
390
389
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
391
390
|
"""
|
392
391
|
return pulumi.get(self, "allow_replace_key")
|
393
392
|
|
394
|
-
@property
|
393
|
+
@_builtins.property
|
395
394
|
@pulumi.getter(name="allowStoreKey")
|
396
|
-
def allow_store_key(self) -> Optional[
|
395
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
397
396
|
"""
|
398
397
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
399
398
|
"""
|
400
399
|
return pulumi.get(self, "allow_store_key")
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter(name="anyMount")
|
404
|
-
def any_mount(self) -> Optional[
|
403
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
405
404
|
"""
|
406
405
|
Allow usage from any mount point within the namespace if 'true'
|
407
406
|
"""
|
408
407
|
return pulumi.get(self, "any_mount")
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter
|
412
|
-
def environment(self) -> Optional[
|
411
|
+
def environment(self) -> Optional[_builtins.str]:
|
413
412
|
"""
|
414
413
|
The Azure Cloud environment API endpoints to use
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "environment")
|
417
416
|
|
418
|
-
@property
|
417
|
+
@_builtins.property
|
419
418
|
@pulumi.getter(name="keyBits")
|
420
|
-
def key_bits(self) -> Optional[
|
419
|
+
def key_bits(self) -> Optional[_builtins.str]:
|
421
420
|
"""
|
422
421
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
423
422
|
"""
|
424
423
|
return pulumi.get(self, "key_bits")
|
425
424
|
|
426
|
-
@property
|
425
|
+
@_builtins.property
|
427
426
|
@pulumi.getter
|
428
|
-
def resource(self) -> Optional[
|
427
|
+
def resource(self) -> Optional[_builtins.str]:
|
429
428
|
"""
|
430
429
|
The Azure Key Vault resource's DNS Suffix to connect to
|
431
430
|
"""
|
432
431
|
return pulumi.get(self, "resource")
|
433
432
|
|
434
|
-
@property
|
433
|
+
@_builtins.property
|
435
434
|
@pulumi.getter
|
436
|
-
def uuid(self) -> Optional[
|
435
|
+
def uuid(self) -> Optional[_builtins.str]:
|
437
436
|
"""
|
438
437
|
ID of the managed key read from Vault
|
439
438
|
"""
|
@@ -476,39 +475,39 @@ class KeysPkc(dict):
|
|
476
475
|
return super().get(key, default)
|
477
476
|
|
478
477
|
def __init__(__self__, *,
|
479
|
-
key_id:
|
480
|
-
key_label:
|
481
|
-
library:
|
482
|
-
mechanism:
|
483
|
-
name:
|
484
|
-
pin:
|
485
|
-
allow_generate_key: Optional[
|
486
|
-
allow_replace_key: Optional[
|
487
|
-
allow_store_key: Optional[
|
488
|
-
any_mount: Optional[
|
489
|
-
curve: Optional[
|
490
|
-
force_rw_session: Optional[
|
491
|
-
key_bits: Optional[
|
492
|
-
slot: Optional[
|
493
|
-
token_label: Optional[
|
494
|
-
uuid: Optional[
|
495
|
-
"""
|
496
|
-
:param
|
497
|
-
:param
|
498
|
-
:param
|
499
|
-
:param
|
500
|
-
:param
|
501
|
-
:param
|
502
|
-
:param
|
503
|
-
:param
|
504
|
-
:param
|
505
|
-
:param
|
506
|
-
:param
|
507
|
-
:param
|
508
|
-
:param
|
509
|
-
:param
|
510
|
-
:param
|
511
|
-
:param
|
478
|
+
key_id: _builtins.str,
|
479
|
+
key_label: _builtins.str,
|
480
|
+
library: _builtins.str,
|
481
|
+
mechanism: _builtins.str,
|
482
|
+
name: _builtins.str,
|
483
|
+
pin: _builtins.str,
|
484
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
485
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
486
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
487
|
+
any_mount: Optional[_builtins.bool] = None,
|
488
|
+
curve: Optional[_builtins.str] = None,
|
489
|
+
force_rw_session: Optional[_builtins.str] = None,
|
490
|
+
key_bits: Optional[_builtins.str] = None,
|
491
|
+
slot: Optional[_builtins.str] = None,
|
492
|
+
token_label: Optional[_builtins.str] = None,
|
493
|
+
uuid: Optional[_builtins.str] = None):
|
494
|
+
"""
|
495
|
+
:param _builtins.str key_id: The id of a PKCS#11 key to use
|
496
|
+
:param _builtins.str key_label: The label of the key to use
|
497
|
+
:param _builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
498
|
+
:param _builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
499
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
500
|
+
:param _builtins.str pin: The PIN for login
|
501
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
502
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
503
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
504
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
505
|
+
:param _builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
506
|
+
:param _builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
|
507
|
+
:param _builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
508
|
+
:param _builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
509
|
+
:param _builtins.str token_label: The slot token label to use
|
510
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
512
511
|
"""
|
513
512
|
pulumi.set(__self__, "key_id", key_id)
|
514
513
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -537,129 +536,129 @@ class KeysPkc(dict):
|
|
537
536
|
if uuid is not None:
|
538
537
|
pulumi.set(__self__, "uuid", uuid)
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter(name="keyId")
|
542
|
-
def key_id(self) ->
|
541
|
+
def key_id(self) -> _builtins.str:
|
543
542
|
"""
|
544
543
|
The id of a PKCS#11 key to use
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "key_id")
|
547
546
|
|
548
|
-
@property
|
547
|
+
@_builtins.property
|
549
548
|
@pulumi.getter(name="keyLabel")
|
550
|
-
def key_label(self) ->
|
549
|
+
def key_label(self) -> _builtins.str:
|
551
550
|
"""
|
552
551
|
The label of the key to use
|
553
552
|
"""
|
554
553
|
return pulumi.get(self, "key_label")
|
555
554
|
|
556
|
-
@property
|
555
|
+
@_builtins.property
|
557
556
|
@pulumi.getter
|
558
|
-
def library(self) ->
|
557
|
+
def library(self) -> _builtins.str:
|
559
558
|
"""
|
560
559
|
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
561
560
|
"""
|
562
561
|
return pulumi.get(self, "library")
|
563
562
|
|
564
|
-
@property
|
563
|
+
@_builtins.property
|
565
564
|
@pulumi.getter
|
566
|
-
def mechanism(self) ->
|
565
|
+
def mechanism(self) -> _builtins.str:
|
567
566
|
"""
|
568
567
|
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
569
568
|
"""
|
570
569
|
return pulumi.get(self, "mechanism")
|
571
570
|
|
572
|
-
@property
|
571
|
+
@_builtins.property
|
573
572
|
@pulumi.getter
|
574
|
-
def name(self) ->
|
573
|
+
def name(self) -> _builtins.str:
|
575
574
|
"""
|
576
575
|
A unique lowercase name that serves as identifying the key
|
577
576
|
"""
|
578
577
|
return pulumi.get(self, "name")
|
579
578
|
|
580
|
-
@property
|
579
|
+
@_builtins.property
|
581
580
|
@pulumi.getter
|
582
|
-
def pin(self) ->
|
581
|
+
def pin(self) -> _builtins.str:
|
583
582
|
"""
|
584
583
|
The PIN for login
|
585
584
|
"""
|
586
585
|
return pulumi.get(self, "pin")
|
587
586
|
|
588
|
-
@property
|
587
|
+
@_builtins.property
|
589
588
|
@pulumi.getter(name="allowGenerateKey")
|
590
|
-
def allow_generate_key(self) -> Optional[
|
589
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
591
590
|
"""
|
592
591
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
593
592
|
"""
|
594
593
|
return pulumi.get(self, "allow_generate_key")
|
595
594
|
|
596
|
-
@property
|
595
|
+
@_builtins.property
|
597
596
|
@pulumi.getter(name="allowReplaceKey")
|
598
|
-
def allow_replace_key(self) -> Optional[
|
597
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
599
598
|
"""
|
600
599
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
601
600
|
"""
|
602
601
|
return pulumi.get(self, "allow_replace_key")
|
603
602
|
|
604
|
-
@property
|
603
|
+
@_builtins.property
|
605
604
|
@pulumi.getter(name="allowStoreKey")
|
606
|
-
def allow_store_key(self) -> Optional[
|
605
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
607
606
|
"""
|
608
607
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
609
608
|
"""
|
610
609
|
return pulumi.get(self, "allow_store_key")
|
611
610
|
|
612
|
-
@property
|
611
|
+
@_builtins.property
|
613
612
|
@pulumi.getter(name="anyMount")
|
614
|
-
def any_mount(self) -> Optional[
|
613
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
615
614
|
"""
|
616
615
|
Allow usage from any mount point within the namespace if 'true'
|
617
616
|
"""
|
618
617
|
return pulumi.get(self, "any_mount")
|
619
618
|
|
620
|
-
@property
|
619
|
+
@_builtins.property
|
621
620
|
@pulumi.getter
|
622
|
-
def curve(self) -> Optional[
|
621
|
+
def curve(self) -> Optional[_builtins.str]:
|
623
622
|
"""
|
624
623
|
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
625
624
|
"""
|
626
625
|
return pulumi.get(self, "curve")
|
627
626
|
|
628
|
-
@property
|
627
|
+
@_builtins.property
|
629
628
|
@pulumi.getter(name="forceRwSession")
|
630
|
-
def force_rw_session(self) -> Optional[
|
629
|
+
def force_rw_session(self) -> Optional[_builtins.str]:
|
631
630
|
"""
|
632
631
|
Force all operations to open up a read-write session to the HSM
|
633
632
|
"""
|
634
633
|
return pulumi.get(self, "force_rw_session")
|
635
634
|
|
636
|
-
@property
|
635
|
+
@_builtins.property
|
637
636
|
@pulumi.getter(name="keyBits")
|
638
|
-
def key_bits(self) -> Optional[
|
637
|
+
def key_bits(self) -> Optional[_builtins.str]:
|
639
638
|
"""
|
640
639
|
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
641
640
|
"""
|
642
641
|
return pulumi.get(self, "key_bits")
|
643
642
|
|
644
|
-
@property
|
643
|
+
@_builtins.property
|
645
644
|
@pulumi.getter
|
646
|
-
def slot(self) -> Optional[
|
645
|
+
def slot(self) -> Optional[_builtins.str]:
|
647
646
|
"""
|
648
647
|
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
649
648
|
"""
|
650
649
|
return pulumi.get(self, "slot")
|
651
650
|
|
652
|
-
@property
|
651
|
+
@_builtins.property
|
653
652
|
@pulumi.getter(name="tokenLabel")
|
654
|
-
def token_label(self) -> Optional[
|
653
|
+
def token_label(self) -> Optional[_builtins.str]:
|
655
654
|
"""
|
656
655
|
The slot token label to use
|
657
656
|
"""
|
658
657
|
return pulumi.get(self, "token_label")
|
659
658
|
|
660
|
-
@property
|
659
|
+
@_builtins.property
|
661
660
|
@pulumi.getter
|
662
|
-
def uuid(self) -> Optional[
|
661
|
+
def uuid(self) -> Optional[_builtins.str]:
|
663
662
|
"""
|
664
663
|
ID of the managed key read from Vault
|
665
664
|
"""
|