pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,25 +19,29 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
20
19
  @pulumi.input_type
21
20
  class SecretBackendCaArgs:
22
21
  def __init__(__self__, *,
23
- backend: Optional[pulumi.Input[builtins.str]] = None,
24
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
25
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
26
- key_type: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None,
28
- private_key: Optional[pulumi.Input[builtins.str]] = None,
29
- public_key: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
25
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
26
+ managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
27
+ managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
30
+ public_key: Optional[pulumi.Input[_builtins.str]] = None):
30
31
  """
31
32
  The set of arguments for constructing a SecretBackendCa resource.
32
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
33
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
34
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
35
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
34
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
35
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
36
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
37
+ :param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
38
+ :param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
39
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
40
  The value should not contain leading or trailing forward slashes.
38
41
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
42
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
41
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
43
+ :param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
44
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
42
45
  """
43
46
  if backend is not None:
44
47
  pulumi.set(__self__, "backend", backend)
@@ -48,6 +51,10 @@ class SecretBackendCaArgs:
48
51
  pulumi.set(__self__, "key_bits", key_bits)
49
52
  if key_type is not None:
50
53
  pulumi.set(__self__, "key_type", key_type)
54
+ if managed_key_id is not None:
55
+ pulumi.set(__self__, "managed_key_id", managed_key_id)
56
+ if managed_key_name is not None:
57
+ pulumi.set(__self__, "managed_key_name", managed_key_name)
51
58
  if namespace is not None:
52
59
  pulumi.set(__self__, "namespace", namespace)
53
60
  if private_key is not None:
@@ -55,57 +62,81 @@ class SecretBackendCaArgs:
55
62
  if public_key is not None:
56
63
  pulumi.set(__self__, "public_key", public_key)
57
64
 
58
- @property
65
+ @_builtins.property
59
66
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
67
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
68
  """
62
69
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
63
70
  """
64
71
  return pulumi.get(self, "backend")
65
72
 
66
73
  @backend.setter
67
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
74
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
68
75
  pulumi.set(self, "backend", value)
69
76
 
70
- @property
77
+ @_builtins.property
71
78
  @pulumi.getter(name="generateSigningKey")
72
- def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
79
+ def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
73
80
  """
74
81
  Whether Vault should generate the signing key pair internally. Defaults to true
75
82
  """
76
83
  return pulumi.get(self, "generate_signing_key")
77
84
 
78
85
  @generate_signing_key.setter
79
- def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
86
+ def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
80
87
  pulumi.set(self, "generate_signing_key", value)
81
88
 
82
- @property
89
+ @_builtins.property
83
90
  @pulumi.getter(name="keyBits")
84
- def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
91
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
85
92
  """
86
93
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
87
94
  """
88
95
  return pulumi.get(self, "key_bits")
89
96
 
90
97
  @key_bits.setter
91
- def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
98
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
92
99
  pulumi.set(self, "key_bits", value)
93
100
 
94
- @property
101
+ @_builtins.property
95
102
  @pulumi.getter(name="keyType")
96
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
103
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
97
104
  """
98
105
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
99
106
  """
100
107
  return pulumi.get(self, "key_type")
101
108
 
102
109
  @key_type.setter
103
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
110
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
104
111
  pulumi.set(self, "key_type", value)
105
112
 
106
- @property
113
+ @_builtins.property
114
+ @pulumi.getter(name="managedKeyId")
115
+ def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
116
+ """
117
+ The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
118
+ """
119
+ return pulumi.get(self, "managed_key_id")
120
+
121
+ @managed_key_id.setter
122
+ def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
123
+ pulumi.set(self, "managed_key_id", value)
124
+
125
+ @_builtins.property
126
+ @pulumi.getter(name="managedKeyName")
127
+ def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
128
+ """
129
+ The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
130
+ """
131
+ return pulumi.get(self, "managed_key_name")
132
+
133
+ @managed_key_name.setter
134
+ def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
135
+ pulumi.set(self, "managed_key_name", value)
136
+
137
+ @_builtins.property
107
138
  @pulumi.getter
108
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
139
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
109
140
  """
110
141
  The namespace to provision the resource in.
111
142
  The value should not contain leading or trailing forward slashes.
@@ -115,56 +146,60 @@ class SecretBackendCaArgs:
115
146
  return pulumi.get(self, "namespace")
116
147
 
117
148
  @namespace.setter
118
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
149
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
119
150
  pulumi.set(self, "namespace", value)
120
151
 
121
- @property
152
+ @_builtins.property
122
153
  @pulumi.getter(name="privateKey")
123
- def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
154
+ def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
124
155
  """
125
- Private key part the SSH CA key pair; required if generate_signing_key is false.
156
+ The private key part the SSH CA key pair; required if generate_signing_key is false.
126
157
  """
127
158
  return pulumi.get(self, "private_key")
128
159
 
129
160
  @private_key.setter
130
- def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
161
+ def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
131
162
  pulumi.set(self, "private_key", value)
132
163
 
133
- @property
164
+ @_builtins.property
134
165
  @pulumi.getter(name="publicKey")
135
- def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
166
+ def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
136
167
  """
137
168
  The public key part the SSH CA key pair; required if generate_signing_key is false.
138
169
  """
139
170
  return pulumi.get(self, "public_key")
140
171
 
141
172
  @public_key.setter
142
- def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
173
+ def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
143
174
  pulumi.set(self, "public_key", value)
144
175
 
145
176
 
146
177
  @pulumi.input_type
147
178
  class _SecretBackendCaState:
148
179
  def __init__(__self__, *,
149
- backend: Optional[pulumi.Input[builtins.str]] = None,
150
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
151
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
152
- key_type: Optional[pulumi.Input[builtins.str]] = None,
153
- namespace: Optional[pulumi.Input[builtins.str]] = None,
154
- private_key: Optional[pulumi.Input[builtins.str]] = None,
155
- public_key: Optional[pulumi.Input[builtins.str]] = None):
180
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
181
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
182
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
183
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
184
+ managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
185
+ managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
186
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
187
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
188
+ public_key: Optional[pulumi.Input[_builtins.str]] = None):
156
189
  """
157
190
  Input properties used for looking up and filtering SecretBackendCa resources.
158
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
159
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
160
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
161
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
162
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
191
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
192
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
193
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
194
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
195
+ :param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
196
+ :param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
197
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
163
198
  The value should not contain leading or trailing forward slashes.
164
199
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
165
200
  *Available only for Vault Enterprise*.
166
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
167
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
201
+ :param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
202
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
168
203
  """
169
204
  if backend is not None:
170
205
  pulumi.set(__self__, "backend", backend)
@@ -174,6 +209,10 @@ class _SecretBackendCaState:
174
209
  pulumi.set(__self__, "key_bits", key_bits)
175
210
  if key_type is not None:
176
211
  pulumi.set(__self__, "key_type", key_type)
212
+ if managed_key_id is not None:
213
+ pulumi.set(__self__, "managed_key_id", managed_key_id)
214
+ if managed_key_name is not None:
215
+ pulumi.set(__self__, "managed_key_name", managed_key_name)
177
216
  if namespace is not None:
178
217
  pulumi.set(__self__, "namespace", namespace)
179
218
  if private_key is not None:
@@ -181,57 +220,81 @@ class _SecretBackendCaState:
181
220
  if public_key is not None:
182
221
  pulumi.set(__self__, "public_key", public_key)
183
222
 
184
- @property
223
+ @_builtins.property
185
224
  @pulumi.getter
186
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
225
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
187
226
  """
188
227
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
189
228
  """
190
229
  return pulumi.get(self, "backend")
191
230
 
192
231
  @backend.setter
193
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
232
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
194
233
  pulumi.set(self, "backend", value)
195
234
 
196
- @property
235
+ @_builtins.property
197
236
  @pulumi.getter(name="generateSigningKey")
198
- def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
237
+ def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
199
238
  """
200
239
  Whether Vault should generate the signing key pair internally. Defaults to true
201
240
  """
202
241
  return pulumi.get(self, "generate_signing_key")
203
242
 
204
243
  @generate_signing_key.setter
205
- def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
244
+ def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
206
245
  pulumi.set(self, "generate_signing_key", value)
207
246
 
208
- @property
247
+ @_builtins.property
209
248
  @pulumi.getter(name="keyBits")
210
- def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
249
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
211
250
  """
212
251
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
213
252
  """
214
253
  return pulumi.get(self, "key_bits")
215
254
 
216
255
  @key_bits.setter
217
- def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
256
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
218
257
  pulumi.set(self, "key_bits", value)
219
258
 
220
- @property
259
+ @_builtins.property
221
260
  @pulumi.getter(name="keyType")
222
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
261
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
223
262
  """
224
263
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
225
264
  """
226
265
  return pulumi.get(self, "key_type")
227
266
 
228
267
  @key_type.setter
229
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
268
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
230
269
  pulumi.set(self, "key_type", value)
231
270
 
232
- @property
271
+ @_builtins.property
272
+ @pulumi.getter(name="managedKeyId")
273
+ def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
274
+ """
275
+ The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
276
+ """
277
+ return pulumi.get(self, "managed_key_id")
278
+
279
+ @managed_key_id.setter
280
+ def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
281
+ pulumi.set(self, "managed_key_id", value)
282
+
283
+ @_builtins.property
284
+ @pulumi.getter(name="managedKeyName")
285
+ def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
286
+ """
287
+ The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
288
+ """
289
+ return pulumi.get(self, "managed_key_name")
290
+
291
+ @managed_key_name.setter
292
+ def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
293
+ pulumi.set(self, "managed_key_name", value)
294
+
295
+ @_builtins.property
233
296
  @pulumi.getter
234
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
297
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
235
298
  """
236
299
  The namespace to provision the resource in.
237
300
  The value should not contain leading or trailing forward slashes.
@@ -241,31 +304,31 @@ class _SecretBackendCaState:
241
304
  return pulumi.get(self, "namespace")
242
305
 
243
306
  @namespace.setter
244
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
307
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
245
308
  pulumi.set(self, "namespace", value)
246
309
 
247
- @property
310
+ @_builtins.property
248
311
  @pulumi.getter(name="privateKey")
249
- def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
312
+ def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
250
313
  """
251
- Private key part the SSH CA key pair; required if generate_signing_key is false.
314
+ The private key part the SSH CA key pair; required if generate_signing_key is false.
252
315
  """
253
316
  return pulumi.get(self, "private_key")
254
317
 
255
318
  @private_key.setter
256
- def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
319
+ def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
257
320
  pulumi.set(self, "private_key", value)
258
321
 
259
- @property
322
+ @_builtins.property
260
323
  @pulumi.getter(name="publicKey")
261
- def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
324
+ def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
262
325
  """
263
326
  The public key part the SSH CA key pair; required if generate_signing_key is false.
264
327
  """
265
328
  return pulumi.get(self, "public_key")
266
329
 
267
330
  @public_key.setter
268
- def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
331
+ def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
269
332
  pulumi.set(self, "public_key", value)
270
333
 
271
334
 
@@ -275,13 +338,15 @@ class SecretBackendCa(pulumi.CustomResource):
275
338
  def __init__(__self__,
276
339
  resource_name: str,
277
340
  opts: Optional[pulumi.ResourceOptions] = None,
278
- backend: Optional[pulumi.Input[builtins.str]] = None,
279
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
280
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
281
- key_type: Optional[pulumi.Input[builtins.str]] = None,
282
- namespace: Optional[pulumi.Input[builtins.str]] = None,
283
- private_key: Optional[pulumi.Input[builtins.str]] = None,
284
- public_key: Optional[pulumi.Input[builtins.str]] = None,
341
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
342
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
343
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
344
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
345
+ managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
346
+ managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
347
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
348
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
349
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
285
350
  __props__=None):
286
351
  """
287
352
  Provides a resource to manage CA information in an SSH secret backend
@@ -307,16 +372,18 @@ class SecretBackendCa(pulumi.CustomResource):
307
372
 
308
373
  :param str resource_name: The name of the resource.
309
374
  :param pulumi.ResourceOptions opts: Options for the resource.
310
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
311
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
312
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
313
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
314
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
375
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
376
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
377
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
378
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
379
+ :param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
380
+ :param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
381
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
315
382
  The value should not contain leading or trailing forward slashes.
316
383
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
317
384
  *Available only for Vault Enterprise*.
318
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
319
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
385
+ :param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
386
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
320
387
  """
321
388
  ...
322
389
  @overload
@@ -361,13 +428,15 @@ class SecretBackendCa(pulumi.CustomResource):
361
428
  def _internal_init(__self__,
362
429
  resource_name: str,
363
430
  opts: Optional[pulumi.ResourceOptions] = None,
364
- backend: Optional[pulumi.Input[builtins.str]] = None,
365
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
366
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
367
- key_type: Optional[pulumi.Input[builtins.str]] = None,
368
- namespace: Optional[pulumi.Input[builtins.str]] = None,
369
- private_key: Optional[pulumi.Input[builtins.str]] = None,
370
- public_key: Optional[pulumi.Input[builtins.str]] = None,
431
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
432
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
433
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
434
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
435
+ managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
436
+ managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
437
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
438
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
439
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
371
440
  __props__=None):
372
441
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
373
442
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -381,6 +450,8 @@ class SecretBackendCa(pulumi.CustomResource):
381
450
  __props__.__dict__["generate_signing_key"] = generate_signing_key
382
451
  __props__.__dict__["key_bits"] = key_bits
383
452
  __props__.__dict__["key_type"] = key_type
453
+ __props__.__dict__["managed_key_id"] = managed_key_id
454
+ __props__.__dict__["managed_key_name"] = managed_key_name
384
455
  __props__.__dict__["namespace"] = namespace
385
456
  __props__.__dict__["private_key"] = None if private_key is None else pulumi.Output.secret(private_key)
386
457
  __props__.__dict__["public_key"] = public_key
@@ -396,13 +467,15 @@ class SecretBackendCa(pulumi.CustomResource):
396
467
  def get(resource_name: str,
397
468
  id: pulumi.Input[str],
398
469
  opts: Optional[pulumi.ResourceOptions] = None,
399
- backend: Optional[pulumi.Input[builtins.str]] = None,
400
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
401
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
402
- key_type: Optional[pulumi.Input[builtins.str]] = None,
403
- namespace: Optional[pulumi.Input[builtins.str]] = None,
404
- private_key: Optional[pulumi.Input[builtins.str]] = None,
405
- public_key: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendCa':
470
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
471
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
472
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
473
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
474
+ managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
475
+ managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
476
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
477
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
478
+ public_key: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendCa':
406
479
  """
407
480
  Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
408
481
  properties used to qualify the lookup.
@@ -410,16 +483,18 @@ class SecretBackendCa(pulumi.CustomResource):
410
483
  :param str resource_name: The unique name of the resulting resource.
411
484
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
412
485
  :param pulumi.ResourceOptions opts: Options for the resource.
413
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
414
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
415
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
416
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
417
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
486
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
487
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
488
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
489
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
490
+ :param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
491
+ :param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
492
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
418
493
  The value should not contain leading or trailing forward slashes.
419
494
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
420
495
  *Available only for Vault Enterprise*.
421
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
422
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
496
+ :param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
497
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
423
498
  """
424
499
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
425
500
 
@@ -429,46 +504,64 @@ class SecretBackendCa(pulumi.CustomResource):
429
504
  __props__.__dict__["generate_signing_key"] = generate_signing_key
430
505
  __props__.__dict__["key_bits"] = key_bits
431
506
  __props__.__dict__["key_type"] = key_type
507
+ __props__.__dict__["managed_key_id"] = managed_key_id
508
+ __props__.__dict__["managed_key_name"] = managed_key_name
432
509
  __props__.__dict__["namespace"] = namespace
433
510
  __props__.__dict__["private_key"] = private_key
434
511
  __props__.__dict__["public_key"] = public_key
435
512
  return SecretBackendCa(resource_name, opts=opts, __props__=__props__)
436
513
 
437
- @property
514
+ @_builtins.property
438
515
  @pulumi.getter
439
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
516
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
440
517
  """
441
518
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
442
519
  """
443
520
  return pulumi.get(self, "backend")
444
521
 
445
- @property
522
+ @_builtins.property
446
523
  @pulumi.getter(name="generateSigningKey")
447
- def generate_signing_key(self) -> pulumi.Output[Optional[builtins.bool]]:
524
+ def generate_signing_key(self) -> pulumi.Output[Optional[_builtins.bool]]:
448
525
  """
449
526
  Whether Vault should generate the signing key pair internally. Defaults to true
450
527
  """
451
528
  return pulumi.get(self, "generate_signing_key")
452
529
 
453
- @property
530
+ @_builtins.property
454
531
  @pulumi.getter(name="keyBits")
455
- def key_bits(self) -> pulumi.Output[Optional[builtins.int]]:
532
+ def key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
456
533
  """
457
534
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
458
535
  """
459
536
  return pulumi.get(self, "key_bits")
460
537
 
461
- @property
538
+ @_builtins.property
462
539
  @pulumi.getter(name="keyType")
463
- def key_type(self) -> pulumi.Output[Optional[builtins.str]]:
540
+ def key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
464
541
  """
465
542
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
466
543
  """
467
544
  return pulumi.get(self, "key_type")
468
545
 
469
- @property
546
+ @_builtins.property
547
+ @pulumi.getter(name="managedKeyId")
548
+ def managed_key_id(self) -> pulumi.Output[Optional[_builtins.str]]:
549
+ """
550
+ The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
551
+ """
552
+ return pulumi.get(self, "managed_key_id")
553
+
554
+ @_builtins.property
555
+ @pulumi.getter(name="managedKeyName")
556
+ def managed_key_name(self) -> pulumi.Output[Optional[_builtins.str]]:
557
+ """
558
+ The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
559
+ """
560
+ return pulumi.get(self, "managed_key_name")
561
+
562
+ @_builtins.property
470
563
  @pulumi.getter
471
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
564
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
472
565
  """
473
566
  The namespace to provision the resource in.
474
567
  The value should not contain leading or trailing forward slashes.
@@ -477,17 +570,17 @@ class SecretBackendCa(pulumi.CustomResource):
477
570
  """
478
571
  return pulumi.get(self, "namespace")
479
572
 
480
- @property
573
+ @_builtins.property
481
574
  @pulumi.getter(name="privateKey")
482
- def private_key(self) -> pulumi.Output[builtins.str]:
575
+ def private_key(self) -> pulumi.Output[_builtins.str]:
483
576
  """
484
- Private key part the SSH CA key pair; required if generate_signing_key is false.
577
+ The private key part the SSH CA key pair; required if generate_signing_key is false.
485
578
  """
486
579
  return pulumi.get(self, "private_key")
487
580
 
488
- @property
581
+ @_builtins.property
489
582
  @pulumi.getter(name="publicKey")
490
- def public_key(self) -> pulumi.Output[builtins.str]:
583
+ def public_key(self) -> pulumi.Output[_builtins.str]:
491
584
  """
492
585
  The public key part the SSH CA key pair; required if generate_signing_key is false.
493
586
  """