pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -28,59 +27,59 @@ MYPY = False
28
27
 
29
28
  if not MYPY:
30
29
  class KeysAwArgsDict(TypedDict):
31
- access_key: pulumi.Input[builtins.str]
30
+ access_key: pulumi.Input[_builtins.str]
32
31
  """
33
32
  The AWS access key to use
34
33
  """
35
- key_bits: pulumi.Input[builtins.str]
34
+ key_bits: pulumi.Input[_builtins.str]
36
35
  """
37
36
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
38
37
  """
39
- key_type: pulumi.Input[builtins.str]
38
+ key_type: pulumi.Input[_builtins.str]
40
39
  """
41
40
  The type of key to use
42
41
  """
43
- kms_key: pulumi.Input[builtins.str]
42
+ kms_key: pulumi.Input[_builtins.str]
44
43
  """
45
44
  An identifier for the key
46
45
  """
47
- name: pulumi.Input[builtins.str]
46
+ name: pulumi.Input[_builtins.str]
48
47
  """
49
48
  A unique lowercase name that serves as identifying the key
50
49
  """
51
- secret_key: pulumi.Input[builtins.str]
50
+ secret_key: pulumi.Input[_builtins.str]
52
51
  """
53
52
  The AWS secret key to use
54
53
  """
55
- allow_generate_key: NotRequired[pulumi.Input[builtins.bool]]
54
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
56
55
  """
57
56
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
58
57
  """
59
- allow_replace_key: NotRequired[pulumi.Input[builtins.bool]]
58
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
60
59
  """
61
60
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
62
61
  """
63
- allow_store_key: NotRequired[pulumi.Input[builtins.bool]]
62
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
64
63
  """
65
64
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
66
65
  """
67
- any_mount: NotRequired[pulumi.Input[builtins.bool]]
66
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
68
67
  """
69
68
  Allow usage from any mount point within the namespace if 'true'
70
69
  """
71
- curve: NotRequired[pulumi.Input[builtins.str]]
70
+ curve: NotRequired[pulumi.Input[_builtins.str]]
72
71
  """
73
72
  The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
74
73
  """
75
- endpoint: NotRequired[pulumi.Input[builtins.str]]
74
+ endpoint: NotRequired[pulumi.Input[_builtins.str]]
76
75
  """
77
76
  Used to specify a custom AWS endpoint
78
77
  """
79
- region: NotRequired[pulumi.Input[builtins.str]]
78
+ region: NotRequired[pulumi.Input[_builtins.str]]
80
79
  """
81
80
  The AWS region where the keys are stored (or will be stored)
82
81
  """
83
- uuid: NotRequired[pulumi.Input[builtins.str]]
82
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
84
83
  """
85
84
  ID of the managed key read from Vault
86
85
  """
@@ -90,35 +89,35 @@ elif False:
90
89
  @pulumi.input_type
91
90
  class KeysAwArgs:
92
91
  def __init__(__self__, *,
93
- access_key: pulumi.Input[builtins.str],
94
- key_bits: pulumi.Input[builtins.str],
95
- key_type: pulumi.Input[builtins.str],
96
- kms_key: pulumi.Input[builtins.str],
97
- name: pulumi.Input[builtins.str],
98
- secret_key: pulumi.Input[builtins.str],
99
- allow_generate_key: Optional[pulumi.Input[builtins.bool]] = None,
100
- allow_replace_key: Optional[pulumi.Input[builtins.bool]] = None,
101
- allow_store_key: Optional[pulumi.Input[builtins.bool]] = None,
102
- any_mount: Optional[pulumi.Input[builtins.bool]] = None,
103
- curve: Optional[pulumi.Input[builtins.str]] = None,
104
- endpoint: Optional[pulumi.Input[builtins.str]] = None,
105
- region: Optional[pulumi.Input[builtins.str]] = None,
106
- uuid: Optional[pulumi.Input[builtins.str]] = None):
107
- """
108
- :param pulumi.Input[builtins.str] access_key: The AWS access key to use
109
- :param pulumi.Input[builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
110
- :param pulumi.Input[builtins.str] key_type: The type of key to use
111
- :param pulumi.Input[builtins.str] kms_key: An identifier for the key
112
- :param pulumi.Input[builtins.str] name: A unique lowercase name that serves as identifying the key
113
- :param pulumi.Input[builtins.str] secret_key: The AWS secret key to use
114
- :param pulumi.Input[builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
115
- :param pulumi.Input[builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
116
- :param pulumi.Input[builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
117
- :param pulumi.Input[builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
118
- :param pulumi.Input[builtins.str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
119
- :param pulumi.Input[builtins.str] endpoint: Used to specify a custom AWS endpoint
120
- :param pulumi.Input[builtins.str] region: The AWS region where the keys are stored (or will be stored)
121
- :param pulumi.Input[builtins.str] uuid: ID of the managed key read from Vault
92
+ access_key: pulumi.Input[_builtins.str],
93
+ key_bits: pulumi.Input[_builtins.str],
94
+ key_type: pulumi.Input[_builtins.str],
95
+ kms_key: pulumi.Input[_builtins.str],
96
+ name: pulumi.Input[_builtins.str],
97
+ secret_key: pulumi.Input[_builtins.str],
98
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
99
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
100
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
101
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
102
+ curve: Optional[pulumi.Input[_builtins.str]] = None,
103
+ endpoint: Optional[pulumi.Input[_builtins.str]] = None,
104
+ region: Optional[pulumi.Input[_builtins.str]] = None,
105
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
106
+ """
107
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key to use
108
+ :param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
109
+ :param pulumi.Input[_builtins.str] key_type: The type of key to use
110
+ :param pulumi.Input[_builtins.str] kms_key: An identifier for the key
111
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
112
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key to use
113
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
114
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
115
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
116
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
117
+ :param pulumi.Input[_builtins.str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
118
+ :param pulumi.Input[_builtins.str] endpoint: Used to specify a custom AWS endpoint
119
+ :param pulumi.Input[_builtins.str] region: The AWS region where the keys are stored (or will be stored)
120
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
122
121
  """
123
122
  pulumi.set(__self__, "access_key", access_key)
124
123
  pulumi.set(__self__, "key_bits", key_bits)
@@ -143,234 +142,234 @@ class KeysAwArgs:
143
142
  if uuid is not None:
144
143
  pulumi.set(__self__, "uuid", uuid)
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter(name="accessKey")
148
- def access_key(self) -> pulumi.Input[builtins.str]:
147
+ def access_key(self) -> pulumi.Input[_builtins.str]:
149
148
  """
150
149
  The AWS access key to use
151
150
  """
152
151
  return pulumi.get(self, "access_key")
153
152
 
154
153
  @access_key.setter
155
- def access_key(self, value: pulumi.Input[builtins.str]):
154
+ def access_key(self, value: pulumi.Input[_builtins.str]):
156
155
  pulumi.set(self, "access_key", value)
157
156
 
158
- @property
157
+ @_builtins.property
159
158
  @pulumi.getter(name="keyBits")
160
- def key_bits(self) -> pulumi.Input[builtins.str]:
159
+ def key_bits(self) -> pulumi.Input[_builtins.str]:
161
160
  """
162
161
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
163
162
  """
164
163
  return pulumi.get(self, "key_bits")
165
164
 
166
165
  @key_bits.setter
167
- def key_bits(self, value: pulumi.Input[builtins.str]):
166
+ def key_bits(self, value: pulumi.Input[_builtins.str]):
168
167
  pulumi.set(self, "key_bits", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter(name="keyType")
172
- def key_type(self) -> pulumi.Input[builtins.str]:
171
+ def key_type(self) -> pulumi.Input[_builtins.str]:
173
172
  """
174
173
  The type of key to use
175
174
  """
176
175
  return pulumi.get(self, "key_type")
177
176
 
178
177
  @key_type.setter
179
- def key_type(self, value: pulumi.Input[builtins.str]):
178
+ def key_type(self, value: pulumi.Input[_builtins.str]):
180
179
  pulumi.set(self, "key_type", value)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter(name="kmsKey")
184
- def kms_key(self) -> pulumi.Input[builtins.str]:
183
+ def kms_key(self) -> pulumi.Input[_builtins.str]:
185
184
  """
186
185
  An identifier for the key
187
186
  """
188
187
  return pulumi.get(self, "kms_key")
189
188
 
190
189
  @kms_key.setter
191
- def kms_key(self, value: pulumi.Input[builtins.str]):
190
+ def kms_key(self, value: pulumi.Input[_builtins.str]):
192
191
  pulumi.set(self, "kms_key", value)
193
192
 
194
- @property
193
+ @_builtins.property
195
194
  @pulumi.getter
196
- def name(self) -> pulumi.Input[builtins.str]:
195
+ def name(self) -> pulumi.Input[_builtins.str]:
197
196
  """
198
197
  A unique lowercase name that serves as identifying the key
199
198
  """
200
199
  return pulumi.get(self, "name")
201
200
 
202
201
  @name.setter
203
- def name(self, value: pulumi.Input[builtins.str]):
202
+ def name(self, value: pulumi.Input[_builtins.str]):
204
203
  pulumi.set(self, "name", value)
205
204
 
206
- @property
205
+ @_builtins.property
207
206
  @pulumi.getter(name="secretKey")
208
- def secret_key(self) -> pulumi.Input[builtins.str]:
207
+ def secret_key(self) -> pulumi.Input[_builtins.str]:
209
208
  """
210
209
  The AWS secret key to use
211
210
  """
212
211
  return pulumi.get(self, "secret_key")
213
212
 
214
213
  @secret_key.setter
215
- def secret_key(self, value: pulumi.Input[builtins.str]):
214
+ def secret_key(self, value: pulumi.Input[_builtins.str]):
216
215
  pulumi.set(self, "secret_key", value)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter(name="allowGenerateKey")
220
- def allow_generate_key(self) -> Optional[pulumi.Input[builtins.bool]]:
219
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
221
220
  """
222
221
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
223
222
  """
224
223
  return pulumi.get(self, "allow_generate_key")
225
224
 
226
225
  @allow_generate_key.setter
227
- def allow_generate_key(self, value: Optional[pulumi.Input[builtins.bool]]):
226
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
228
227
  pulumi.set(self, "allow_generate_key", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter(name="allowReplaceKey")
232
- def allow_replace_key(self) -> Optional[pulumi.Input[builtins.bool]]:
231
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
233
232
  """
234
233
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
235
234
  """
236
235
  return pulumi.get(self, "allow_replace_key")
237
236
 
238
237
  @allow_replace_key.setter
239
- def allow_replace_key(self, value: Optional[pulumi.Input[builtins.bool]]):
238
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
240
239
  pulumi.set(self, "allow_replace_key", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter(name="allowStoreKey")
244
- def allow_store_key(self) -> Optional[pulumi.Input[builtins.bool]]:
243
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
245
244
  """
246
245
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
247
246
  """
248
247
  return pulumi.get(self, "allow_store_key")
249
248
 
250
249
  @allow_store_key.setter
251
- def allow_store_key(self, value: Optional[pulumi.Input[builtins.bool]]):
250
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
252
251
  pulumi.set(self, "allow_store_key", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter(name="anyMount")
256
- def any_mount(self) -> Optional[pulumi.Input[builtins.bool]]:
255
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
257
256
  """
258
257
  Allow usage from any mount point within the namespace if 'true'
259
258
  """
260
259
  return pulumi.get(self, "any_mount")
261
260
 
262
261
  @any_mount.setter
263
- def any_mount(self, value: Optional[pulumi.Input[builtins.bool]]):
262
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
264
263
  pulumi.set(self, "any_mount", value)
265
264
 
266
- @property
265
+ @_builtins.property
267
266
  @pulumi.getter
268
- def curve(self) -> Optional[pulumi.Input[builtins.str]]:
267
+ def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
269
268
  """
270
269
  The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
271
270
  """
272
271
  return pulumi.get(self, "curve")
273
272
 
274
273
  @curve.setter
275
- def curve(self, value: Optional[pulumi.Input[builtins.str]]):
274
+ def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
276
275
  pulumi.set(self, "curve", value)
277
276
 
278
- @property
277
+ @_builtins.property
279
278
  @pulumi.getter
280
- def endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
279
+ def endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
281
280
  """
282
281
  Used to specify a custom AWS endpoint
283
282
  """
284
283
  return pulumi.get(self, "endpoint")
285
284
 
286
285
  @endpoint.setter
287
- def endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
286
+ def endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
288
287
  pulumi.set(self, "endpoint", value)
289
288
 
290
- @property
289
+ @_builtins.property
291
290
  @pulumi.getter
292
- def region(self) -> Optional[pulumi.Input[builtins.str]]:
291
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
293
292
  """
294
293
  The AWS region where the keys are stored (or will be stored)
295
294
  """
296
295
  return pulumi.get(self, "region")
297
296
 
298
297
  @region.setter
299
- def region(self, value: Optional[pulumi.Input[builtins.str]]):
298
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
300
299
  pulumi.set(self, "region", value)
301
300
 
302
- @property
301
+ @_builtins.property
303
302
  @pulumi.getter
304
- def uuid(self) -> Optional[pulumi.Input[builtins.str]]:
303
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
305
304
  """
306
305
  ID of the managed key read from Vault
307
306
  """
308
307
  return pulumi.get(self, "uuid")
309
308
 
310
309
  @uuid.setter
311
- def uuid(self, value: Optional[pulumi.Input[builtins.str]]):
310
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
312
311
  pulumi.set(self, "uuid", value)
313
312
 
314
313
 
315
314
  if not MYPY:
316
315
  class KeysAzureArgsDict(TypedDict):
317
- client_id: pulumi.Input[builtins.str]
316
+ client_id: pulumi.Input[_builtins.str]
318
317
  """
319
318
  The client id for credentials to query the Azure APIs
320
319
  """
321
- client_secret: pulumi.Input[builtins.str]
320
+ client_secret: pulumi.Input[_builtins.str]
322
321
  """
323
322
  The client secret for credentials to query the Azure APIs
324
323
  """
325
- key_name: pulumi.Input[builtins.str]
324
+ key_name: pulumi.Input[_builtins.str]
326
325
  """
327
326
  The Key Vault key to use for encryption and decryption
328
327
  """
329
- key_type: pulumi.Input[builtins.str]
328
+ key_type: pulumi.Input[_builtins.str]
330
329
  """
331
330
  The type of key to use
332
331
  """
333
- name: pulumi.Input[builtins.str]
332
+ name: pulumi.Input[_builtins.str]
334
333
  """
335
334
  A unique lowercase name that serves as identifying the key
336
335
  """
337
- tenant_id: pulumi.Input[builtins.str]
336
+ tenant_id: pulumi.Input[_builtins.str]
338
337
  """
339
338
  The tenant id for the Azure Active Directory organization
340
339
  """
341
- vault_name: pulumi.Input[builtins.str]
340
+ vault_name: pulumi.Input[_builtins.str]
342
341
  """
343
342
  The Key Vault vault to use the encryption keys for encryption and decryption
344
343
  """
345
- allow_generate_key: NotRequired[pulumi.Input[builtins.bool]]
344
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
346
345
  """
347
346
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
348
347
  """
349
- allow_replace_key: NotRequired[pulumi.Input[builtins.bool]]
348
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
350
349
  """
351
350
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
352
351
  """
353
- allow_store_key: NotRequired[pulumi.Input[builtins.bool]]
352
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
354
353
  """
355
354
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
356
355
  """
357
- any_mount: NotRequired[pulumi.Input[builtins.bool]]
356
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
358
357
  """
359
358
  Allow usage from any mount point within the namespace if 'true'
360
359
  """
361
- environment: NotRequired[pulumi.Input[builtins.str]]
360
+ environment: NotRequired[pulumi.Input[_builtins.str]]
362
361
  """
363
362
  The Azure Cloud environment API endpoints to use
364
363
  """
365
- key_bits: NotRequired[pulumi.Input[builtins.str]]
364
+ key_bits: NotRequired[pulumi.Input[_builtins.str]]
366
365
  """
367
366
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
368
367
  """
369
- resource: NotRequired[pulumi.Input[builtins.str]]
368
+ resource: NotRequired[pulumi.Input[_builtins.str]]
370
369
  """
371
370
  The Azure Key Vault resource's DNS Suffix to connect to
372
371
  """
373
- uuid: NotRequired[pulumi.Input[builtins.str]]
372
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
374
373
  """
375
374
  ID of the managed key read from Vault
376
375
  """
@@ -380,37 +379,37 @@ elif False:
380
379
  @pulumi.input_type
381
380
  class KeysAzureArgs:
382
381
  def __init__(__self__, *,
383
- client_id: pulumi.Input[builtins.str],
384
- client_secret: pulumi.Input[builtins.str],
385
- key_name: pulumi.Input[builtins.str],
386
- key_type: pulumi.Input[builtins.str],
387
- name: pulumi.Input[builtins.str],
388
- tenant_id: pulumi.Input[builtins.str],
389
- vault_name: pulumi.Input[builtins.str],
390
- allow_generate_key: Optional[pulumi.Input[builtins.bool]] = None,
391
- allow_replace_key: Optional[pulumi.Input[builtins.bool]] = None,
392
- allow_store_key: Optional[pulumi.Input[builtins.bool]] = None,
393
- any_mount: Optional[pulumi.Input[builtins.bool]] = None,
394
- environment: Optional[pulumi.Input[builtins.str]] = None,
395
- key_bits: Optional[pulumi.Input[builtins.str]] = None,
396
- resource: Optional[pulumi.Input[builtins.str]] = None,
397
- uuid: Optional[pulumi.Input[builtins.str]] = None):
398
- """
399
- :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs
400
- :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the Azure APIs
401
- :param pulumi.Input[builtins.str] key_name: The Key Vault key to use for encryption and decryption
402
- :param pulumi.Input[builtins.str] key_type: The type of key to use
403
- :param pulumi.Input[builtins.str] name: A unique lowercase name that serves as identifying the key
404
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory organization
405
- :param pulumi.Input[builtins.str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
406
- :param pulumi.Input[builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
407
- :param pulumi.Input[builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
408
- :param pulumi.Input[builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
409
- :param pulumi.Input[builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
410
- :param pulumi.Input[builtins.str] environment: The Azure Cloud environment API endpoints to use
411
- :param pulumi.Input[builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
412
- :param pulumi.Input[builtins.str] resource: The Azure Key Vault resource's DNS Suffix to connect to
413
- :param pulumi.Input[builtins.str] uuid: ID of the managed key read from Vault
382
+ client_id: pulumi.Input[_builtins.str],
383
+ client_secret: pulumi.Input[_builtins.str],
384
+ key_name: pulumi.Input[_builtins.str],
385
+ key_type: pulumi.Input[_builtins.str],
386
+ name: pulumi.Input[_builtins.str],
387
+ tenant_id: pulumi.Input[_builtins.str],
388
+ vault_name: pulumi.Input[_builtins.str],
389
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
390
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
391
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
392
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
393
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
394
+ key_bits: Optional[pulumi.Input[_builtins.str]] = None,
395
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
396
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
397
+ """
398
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs
399
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the Azure APIs
400
+ :param pulumi.Input[_builtins.str] key_name: The Key Vault key to use for encryption and decryption
401
+ :param pulumi.Input[_builtins.str] key_type: The type of key to use
402
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
403
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory organization
404
+ :param pulumi.Input[_builtins.str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
405
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
406
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
407
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
408
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
409
+ :param pulumi.Input[_builtins.str] environment: The Azure Cloud environment API endpoints to use
410
+ :param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
411
+ :param pulumi.Input[_builtins.str] resource: The Azure Key Vault resource's DNS Suffix to connect to
412
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
414
413
  """
415
414
  pulumi.set(__self__, "client_id", client_id)
416
415
  pulumi.set(__self__, "client_secret", client_secret)
@@ -436,250 +435,250 @@ class KeysAzureArgs:
436
435
  if uuid is not None:
437
436
  pulumi.set(__self__, "uuid", uuid)
438
437
 
439
- @property
438
+ @_builtins.property
440
439
  @pulumi.getter(name="clientId")
441
- def client_id(self) -> pulumi.Input[builtins.str]:
440
+ def client_id(self) -> pulumi.Input[_builtins.str]:
442
441
  """
443
442
  The client id for credentials to query the Azure APIs
444
443
  """
445
444
  return pulumi.get(self, "client_id")
446
445
 
447
446
  @client_id.setter
448
- def client_id(self, value: pulumi.Input[builtins.str]):
447
+ def client_id(self, value: pulumi.Input[_builtins.str]):
449
448
  pulumi.set(self, "client_id", value)
450
449
 
451
- @property
450
+ @_builtins.property
452
451
  @pulumi.getter(name="clientSecret")
453
- def client_secret(self) -> pulumi.Input[builtins.str]:
452
+ def client_secret(self) -> pulumi.Input[_builtins.str]:
454
453
  """
455
454
  The client secret for credentials to query the Azure APIs
456
455
  """
457
456
  return pulumi.get(self, "client_secret")
458
457
 
459
458
  @client_secret.setter
460
- def client_secret(self, value: pulumi.Input[builtins.str]):
459
+ def client_secret(self, value: pulumi.Input[_builtins.str]):
461
460
  pulumi.set(self, "client_secret", value)
462
461
 
463
- @property
462
+ @_builtins.property
464
463
  @pulumi.getter(name="keyName")
465
- def key_name(self) -> pulumi.Input[builtins.str]:
464
+ def key_name(self) -> pulumi.Input[_builtins.str]:
466
465
  """
467
466
  The Key Vault key to use for encryption and decryption
468
467
  """
469
468
  return pulumi.get(self, "key_name")
470
469
 
471
470
  @key_name.setter
472
- def key_name(self, value: pulumi.Input[builtins.str]):
471
+ def key_name(self, value: pulumi.Input[_builtins.str]):
473
472
  pulumi.set(self, "key_name", value)
474
473
 
475
- @property
474
+ @_builtins.property
476
475
  @pulumi.getter(name="keyType")
477
- def key_type(self) -> pulumi.Input[builtins.str]:
476
+ def key_type(self) -> pulumi.Input[_builtins.str]:
478
477
  """
479
478
  The type of key to use
480
479
  """
481
480
  return pulumi.get(self, "key_type")
482
481
 
483
482
  @key_type.setter
484
- def key_type(self, value: pulumi.Input[builtins.str]):
483
+ def key_type(self, value: pulumi.Input[_builtins.str]):
485
484
  pulumi.set(self, "key_type", value)
486
485
 
487
- @property
486
+ @_builtins.property
488
487
  @pulumi.getter
489
- def name(self) -> pulumi.Input[builtins.str]:
488
+ def name(self) -> pulumi.Input[_builtins.str]:
490
489
  """
491
490
  A unique lowercase name that serves as identifying the key
492
491
  """
493
492
  return pulumi.get(self, "name")
494
493
 
495
494
  @name.setter
496
- def name(self, value: pulumi.Input[builtins.str]):
495
+ def name(self, value: pulumi.Input[_builtins.str]):
497
496
  pulumi.set(self, "name", value)
498
497
 
499
- @property
498
+ @_builtins.property
500
499
  @pulumi.getter(name="tenantId")
501
- def tenant_id(self) -> pulumi.Input[builtins.str]:
500
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
502
501
  """
503
502
  The tenant id for the Azure Active Directory organization
504
503
  """
505
504
  return pulumi.get(self, "tenant_id")
506
505
 
507
506
  @tenant_id.setter
508
- def tenant_id(self, value: pulumi.Input[builtins.str]):
507
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
509
508
  pulumi.set(self, "tenant_id", value)
510
509
 
511
- @property
510
+ @_builtins.property
512
511
  @pulumi.getter(name="vaultName")
513
- def vault_name(self) -> pulumi.Input[builtins.str]:
512
+ def vault_name(self) -> pulumi.Input[_builtins.str]:
514
513
  """
515
514
  The Key Vault vault to use the encryption keys for encryption and decryption
516
515
  """
517
516
  return pulumi.get(self, "vault_name")
518
517
 
519
518
  @vault_name.setter
520
- def vault_name(self, value: pulumi.Input[builtins.str]):
519
+ def vault_name(self, value: pulumi.Input[_builtins.str]):
521
520
  pulumi.set(self, "vault_name", value)
522
521
 
523
- @property
522
+ @_builtins.property
524
523
  @pulumi.getter(name="allowGenerateKey")
525
- def allow_generate_key(self) -> Optional[pulumi.Input[builtins.bool]]:
524
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
526
525
  """
527
526
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
528
527
  """
529
528
  return pulumi.get(self, "allow_generate_key")
530
529
 
531
530
  @allow_generate_key.setter
532
- def allow_generate_key(self, value: Optional[pulumi.Input[builtins.bool]]):
531
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
533
532
  pulumi.set(self, "allow_generate_key", value)
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter(name="allowReplaceKey")
537
- def allow_replace_key(self) -> Optional[pulumi.Input[builtins.bool]]:
536
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
538
537
  """
539
538
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
540
539
  """
541
540
  return pulumi.get(self, "allow_replace_key")
542
541
 
543
542
  @allow_replace_key.setter
544
- def allow_replace_key(self, value: Optional[pulumi.Input[builtins.bool]]):
543
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
545
544
  pulumi.set(self, "allow_replace_key", value)
546
545
 
547
- @property
546
+ @_builtins.property
548
547
  @pulumi.getter(name="allowStoreKey")
549
- def allow_store_key(self) -> Optional[pulumi.Input[builtins.bool]]:
548
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
550
549
  """
551
550
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
552
551
  """
553
552
  return pulumi.get(self, "allow_store_key")
554
553
 
555
554
  @allow_store_key.setter
556
- def allow_store_key(self, value: Optional[pulumi.Input[builtins.bool]]):
555
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
557
556
  pulumi.set(self, "allow_store_key", value)
558
557
 
559
- @property
558
+ @_builtins.property
560
559
  @pulumi.getter(name="anyMount")
561
- def any_mount(self) -> Optional[pulumi.Input[builtins.bool]]:
560
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
562
561
  """
563
562
  Allow usage from any mount point within the namespace if 'true'
564
563
  """
565
564
  return pulumi.get(self, "any_mount")
566
565
 
567
566
  @any_mount.setter
568
- def any_mount(self, value: Optional[pulumi.Input[builtins.bool]]):
567
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
569
568
  pulumi.set(self, "any_mount", value)
570
569
 
571
- @property
570
+ @_builtins.property
572
571
  @pulumi.getter
573
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
572
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
574
573
  """
575
574
  The Azure Cloud environment API endpoints to use
576
575
  """
577
576
  return pulumi.get(self, "environment")
578
577
 
579
578
  @environment.setter
580
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
579
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
581
580
  pulumi.set(self, "environment", value)
582
581
 
583
- @property
582
+ @_builtins.property
584
583
  @pulumi.getter(name="keyBits")
585
- def key_bits(self) -> Optional[pulumi.Input[builtins.str]]:
584
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
586
585
  """
587
586
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
588
587
  """
589
588
  return pulumi.get(self, "key_bits")
590
589
 
591
590
  @key_bits.setter
592
- def key_bits(self, value: Optional[pulumi.Input[builtins.str]]):
591
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
593
592
  pulumi.set(self, "key_bits", value)
594
593
 
595
- @property
594
+ @_builtins.property
596
595
  @pulumi.getter
597
- def resource(self) -> Optional[pulumi.Input[builtins.str]]:
596
+ def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
598
597
  """
599
598
  The Azure Key Vault resource's DNS Suffix to connect to
600
599
  """
601
600
  return pulumi.get(self, "resource")
602
601
 
603
602
  @resource.setter
604
- def resource(self, value: Optional[pulumi.Input[builtins.str]]):
603
+ def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
605
604
  pulumi.set(self, "resource", value)
606
605
 
607
- @property
606
+ @_builtins.property
608
607
  @pulumi.getter
609
- def uuid(self) -> Optional[pulumi.Input[builtins.str]]:
608
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
610
609
  """
611
610
  ID of the managed key read from Vault
612
611
  """
613
612
  return pulumi.get(self, "uuid")
614
613
 
615
614
  @uuid.setter
616
- def uuid(self, value: Optional[pulumi.Input[builtins.str]]):
615
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
617
616
  pulumi.set(self, "uuid", value)
618
617
 
619
618
 
620
619
  if not MYPY:
621
620
  class KeysPkcArgsDict(TypedDict):
622
- key_id: pulumi.Input[builtins.str]
621
+ key_id: pulumi.Input[_builtins.str]
623
622
  """
624
623
  The id of a PKCS#11 key to use
625
624
  """
626
- key_label: pulumi.Input[builtins.str]
625
+ key_label: pulumi.Input[_builtins.str]
627
626
  """
628
627
  The label of the key to use
629
628
  """
630
- library: pulumi.Input[builtins.str]
629
+ library: pulumi.Input[_builtins.str]
631
630
  """
632
631
  The name of the kms_library stanza to use from Vault's config to lookup the local library path
633
632
  """
634
- mechanism: pulumi.Input[builtins.str]
633
+ mechanism: pulumi.Input[_builtins.str]
635
634
  """
636
635
  The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
637
636
  """
638
- name: pulumi.Input[builtins.str]
637
+ name: pulumi.Input[_builtins.str]
639
638
  """
640
639
  A unique lowercase name that serves as identifying the key
641
640
  """
642
- pin: pulumi.Input[builtins.str]
641
+ pin: pulumi.Input[_builtins.str]
643
642
  """
644
643
  The PIN for login
645
644
  """
646
- allow_generate_key: NotRequired[pulumi.Input[builtins.bool]]
645
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
647
646
  """
648
647
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
649
648
  """
650
- allow_replace_key: NotRequired[pulumi.Input[builtins.bool]]
649
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
651
650
  """
652
651
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
653
652
  """
654
- allow_store_key: NotRequired[pulumi.Input[builtins.bool]]
653
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
655
654
  """
656
655
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
657
656
  """
658
- any_mount: NotRequired[pulumi.Input[builtins.bool]]
657
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
659
658
  """
660
659
  Allow usage from any mount point within the namespace if 'true'
661
660
  """
662
- curve: NotRequired[pulumi.Input[builtins.str]]
661
+ curve: NotRequired[pulumi.Input[_builtins.str]]
663
662
  """
664
663
  Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
665
664
  """
666
- force_rw_session: NotRequired[pulumi.Input[builtins.str]]
665
+ force_rw_session: NotRequired[pulumi.Input[_builtins.str]]
667
666
  """
668
667
  Force all operations to open up a read-write session to the HSM
669
668
  """
670
- key_bits: NotRequired[pulumi.Input[builtins.str]]
669
+ key_bits: NotRequired[pulumi.Input[_builtins.str]]
671
670
  """
672
671
  Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
673
672
  """
674
- slot: NotRequired[pulumi.Input[builtins.str]]
673
+ slot: NotRequired[pulumi.Input[_builtins.str]]
675
674
  """
676
675
  The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
677
676
  """
678
- token_label: NotRequired[pulumi.Input[builtins.str]]
677
+ token_label: NotRequired[pulumi.Input[_builtins.str]]
679
678
  """
680
679
  The slot token label to use
681
680
  """
682
- uuid: NotRequired[pulumi.Input[builtins.str]]
681
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
683
682
  """
684
683
  ID of the managed key read from Vault
685
684
  """
@@ -689,39 +688,39 @@ elif False:
689
688
  @pulumi.input_type
690
689
  class KeysPkcArgs:
691
690
  def __init__(__self__, *,
692
- key_id: pulumi.Input[builtins.str],
693
- key_label: pulumi.Input[builtins.str],
694
- library: pulumi.Input[builtins.str],
695
- mechanism: pulumi.Input[builtins.str],
696
- name: pulumi.Input[builtins.str],
697
- pin: pulumi.Input[builtins.str],
698
- allow_generate_key: Optional[pulumi.Input[builtins.bool]] = None,
699
- allow_replace_key: Optional[pulumi.Input[builtins.bool]] = None,
700
- allow_store_key: Optional[pulumi.Input[builtins.bool]] = None,
701
- any_mount: Optional[pulumi.Input[builtins.bool]] = None,
702
- curve: Optional[pulumi.Input[builtins.str]] = None,
703
- force_rw_session: Optional[pulumi.Input[builtins.str]] = None,
704
- key_bits: Optional[pulumi.Input[builtins.str]] = None,
705
- slot: Optional[pulumi.Input[builtins.str]] = None,
706
- token_label: Optional[pulumi.Input[builtins.str]] = None,
707
- uuid: Optional[pulumi.Input[builtins.str]] = None):
708
- """
709
- :param pulumi.Input[builtins.str] key_id: The id of a PKCS#11 key to use
710
- :param pulumi.Input[builtins.str] key_label: The label of the key to use
711
- :param pulumi.Input[builtins.str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
712
- :param pulumi.Input[builtins.str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
713
- :param pulumi.Input[builtins.str] name: A unique lowercase name that serves as identifying the key
714
- :param pulumi.Input[builtins.str] pin: The PIN for login
715
- :param pulumi.Input[builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
716
- :param pulumi.Input[builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
717
- :param pulumi.Input[builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
718
- :param pulumi.Input[builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
719
- :param pulumi.Input[builtins.str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
720
- :param pulumi.Input[builtins.str] force_rw_session: Force all operations to open up a read-write session to the HSM
721
- :param pulumi.Input[builtins.str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
722
- :param pulumi.Input[builtins.str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
723
- :param pulumi.Input[builtins.str] token_label: The slot token label to use
724
- :param pulumi.Input[builtins.str] uuid: ID of the managed key read from Vault
691
+ key_id: pulumi.Input[_builtins.str],
692
+ key_label: pulumi.Input[_builtins.str],
693
+ library: pulumi.Input[_builtins.str],
694
+ mechanism: pulumi.Input[_builtins.str],
695
+ name: pulumi.Input[_builtins.str],
696
+ pin: pulumi.Input[_builtins.str],
697
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
698
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
699
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
700
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
701
+ curve: Optional[pulumi.Input[_builtins.str]] = None,
702
+ force_rw_session: Optional[pulumi.Input[_builtins.str]] = None,
703
+ key_bits: Optional[pulumi.Input[_builtins.str]] = None,
704
+ slot: Optional[pulumi.Input[_builtins.str]] = None,
705
+ token_label: Optional[pulumi.Input[_builtins.str]] = None,
706
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
707
+ """
708
+ :param pulumi.Input[_builtins.str] key_id: The id of a PKCS#11 key to use
709
+ :param pulumi.Input[_builtins.str] key_label: The label of the key to use
710
+ :param pulumi.Input[_builtins.str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
711
+ :param pulumi.Input[_builtins.str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
712
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
713
+ :param pulumi.Input[_builtins.str] pin: The PIN for login
714
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
715
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
716
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
717
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
718
+ :param pulumi.Input[_builtins.str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
719
+ :param pulumi.Input[_builtins.str] force_rw_session: Force all operations to open up a read-write session to the HSM
720
+ :param pulumi.Input[_builtins.str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
721
+ :param pulumi.Input[_builtins.str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
722
+ :param pulumi.Input[_builtins.str] token_label: The slot token label to use
723
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
725
724
  """
726
725
  pulumi.set(__self__, "key_id", key_id)
727
726
  pulumi.set(__self__, "key_label", key_label)
@@ -750,196 +749,196 @@ class KeysPkcArgs:
750
749
  if uuid is not None:
751
750
  pulumi.set(__self__, "uuid", uuid)
752
751
 
753
- @property
752
+ @_builtins.property
754
753
  @pulumi.getter(name="keyId")
755
- def key_id(self) -> pulumi.Input[builtins.str]:
754
+ def key_id(self) -> pulumi.Input[_builtins.str]:
756
755
  """
757
756
  The id of a PKCS#11 key to use
758
757
  """
759
758
  return pulumi.get(self, "key_id")
760
759
 
761
760
  @key_id.setter
762
- def key_id(self, value: pulumi.Input[builtins.str]):
761
+ def key_id(self, value: pulumi.Input[_builtins.str]):
763
762
  pulumi.set(self, "key_id", value)
764
763
 
765
- @property
764
+ @_builtins.property
766
765
  @pulumi.getter(name="keyLabel")
767
- def key_label(self) -> pulumi.Input[builtins.str]:
766
+ def key_label(self) -> pulumi.Input[_builtins.str]:
768
767
  """
769
768
  The label of the key to use
770
769
  """
771
770
  return pulumi.get(self, "key_label")
772
771
 
773
772
  @key_label.setter
774
- def key_label(self, value: pulumi.Input[builtins.str]):
773
+ def key_label(self, value: pulumi.Input[_builtins.str]):
775
774
  pulumi.set(self, "key_label", value)
776
775
 
777
- @property
776
+ @_builtins.property
778
777
  @pulumi.getter
779
- def library(self) -> pulumi.Input[builtins.str]:
778
+ def library(self) -> pulumi.Input[_builtins.str]:
780
779
  """
781
780
  The name of the kms_library stanza to use from Vault's config to lookup the local library path
782
781
  """
783
782
  return pulumi.get(self, "library")
784
783
 
785
784
  @library.setter
786
- def library(self, value: pulumi.Input[builtins.str]):
785
+ def library(self, value: pulumi.Input[_builtins.str]):
787
786
  pulumi.set(self, "library", value)
788
787
 
789
- @property
788
+ @_builtins.property
790
789
  @pulumi.getter
791
- def mechanism(self) -> pulumi.Input[builtins.str]:
790
+ def mechanism(self) -> pulumi.Input[_builtins.str]:
792
791
  """
793
792
  The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
794
793
  """
795
794
  return pulumi.get(self, "mechanism")
796
795
 
797
796
  @mechanism.setter
798
- def mechanism(self, value: pulumi.Input[builtins.str]):
797
+ def mechanism(self, value: pulumi.Input[_builtins.str]):
799
798
  pulumi.set(self, "mechanism", value)
800
799
 
801
- @property
800
+ @_builtins.property
802
801
  @pulumi.getter
803
- def name(self) -> pulumi.Input[builtins.str]:
802
+ def name(self) -> pulumi.Input[_builtins.str]:
804
803
  """
805
804
  A unique lowercase name that serves as identifying the key
806
805
  """
807
806
  return pulumi.get(self, "name")
808
807
 
809
808
  @name.setter
810
- def name(self, value: pulumi.Input[builtins.str]):
809
+ def name(self, value: pulumi.Input[_builtins.str]):
811
810
  pulumi.set(self, "name", value)
812
811
 
813
- @property
812
+ @_builtins.property
814
813
  @pulumi.getter
815
- def pin(self) -> pulumi.Input[builtins.str]:
814
+ def pin(self) -> pulumi.Input[_builtins.str]:
816
815
  """
817
816
  The PIN for login
818
817
  """
819
818
  return pulumi.get(self, "pin")
820
819
 
821
820
  @pin.setter
822
- def pin(self, value: pulumi.Input[builtins.str]):
821
+ def pin(self, value: pulumi.Input[_builtins.str]):
823
822
  pulumi.set(self, "pin", value)
824
823
 
825
- @property
824
+ @_builtins.property
826
825
  @pulumi.getter(name="allowGenerateKey")
827
- def allow_generate_key(self) -> Optional[pulumi.Input[builtins.bool]]:
826
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
828
827
  """
829
828
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
830
829
  """
831
830
  return pulumi.get(self, "allow_generate_key")
832
831
 
833
832
  @allow_generate_key.setter
834
- def allow_generate_key(self, value: Optional[pulumi.Input[builtins.bool]]):
833
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
835
834
  pulumi.set(self, "allow_generate_key", value)
836
835
 
837
- @property
836
+ @_builtins.property
838
837
  @pulumi.getter(name="allowReplaceKey")
839
- def allow_replace_key(self) -> Optional[pulumi.Input[builtins.bool]]:
838
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
840
839
  """
841
840
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
842
841
  """
843
842
  return pulumi.get(self, "allow_replace_key")
844
843
 
845
844
  @allow_replace_key.setter
846
- def allow_replace_key(self, value: Optional[pulumi.Input[builtins.bool]]):
845
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
847
846
  pulumi.set(self, "allow_replace_key", value)
848
847
 
849
- @property
848
+ @_builtins.property
850
849
  @pulumi.getter(name="allowStoreKey")
851
- def allow_store_key(self) -> Optional[pulumi.Input[builtins.bool]]:
850
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
852
851
  """
853
852
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
854
853
  """
855
854
  return pulumi.get(self, "allow_store_key")
856
855
 
857
856
  @allow_store_key.setter
858
- def allow_store_key(self, value: Optional[pulumi.Input[builtins.bool]]):
857
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
859
858
  pulumi.set(self, "allow_store_key", value)
860
859
 
861
- @property
860
+ @_builtins.property
862
861
  @pulumi.getter(name="anyMount")
863
- def any_mount(self) -> Optional[pulumi.Input[builtins.bool]]:
862
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
864
863
  """
865
864
  Allow usage from any mount point within the namespace if 'true'
866
865
  """
867
866
  return pulumi.get(self, "any_mount")
868
867
 
869
868
  @any_mount.setter
870
- def any_mount(self, value: Optional[pulumi.Input[builtins.bool]]):
869
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
871
870
  pulumi.set(self, "any_mount", value)
872
871
 
873
- @property
872
+ @_builtins.property
874
873
  @pulumi.getter
875
- def curve(self) -> Optional[pulumi.Input[builtins.str]]:
874
+ def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
876
875
  """
877
876
  Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
878
877
  """
879
878
  return pulumi.get(self, "curve")
880
879
 
881
880
  @curve.setter
882
- def curve(self, value: Optional[pulumi.Input[builtins.str]]):
881
+ def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
883
882
  pulumi.set(self, "curve", value)
884
883
 
885
- @property
884
+ @_builtins.property
886
885
  @pulumi.getter(name="forceRwSession")
887
- def force_rw_session(self) -> Optional[pulumi.Input[builtins.str]]:
886
+ def force_rw_session(self) -> Optional[pulumi.Input[_builtins.str]]:
888
887
  """
889
888
  Force all operations to open up a read-write session to the HSM
890
889
  """
891
890
  return pulumi.get(self, "force_rw_session")
892
891
 
893
892
  @force_rw_session.setter
894
- def force_rw_session(self, value: Optional[pulumi.Input[builtins.str]]):
893
+ def force_rw_session(self, value: Optional[pulumi.Input[_builtins.str]]):
895
894
  pulumi.set(self, "force_rw_session", value)
896
895
 
897
- @property
896
+ @_builtins.property
898
897
  @pulumi.getter(name="keyBits")
899
- def key_bits(self) -> Optional[pulumi.Input[builtins.str]]:
898
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
900
899
  """
901
900
  Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
902
901
  """
903
902
  return pulumi.get(self, "key_bits")
904
903
 
905
904
  @key_bits.setter
906
- def key_bits(self, value: Optional[pulumi.Input[builtins.str]]):
905
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
907
906
  pulumi.set(self, "key_bits", value)
908
907
 
909
- @property
908
+ @_builtins.property
910
909
  @pulumi.getter
911
- def slot(self) -> Optional[pulumi.Input[builtins.str]]:
910
+ def slot(self) -> Optional[pulumi.Input[_builtins.str]]:
912
911
  """
913
912
  The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
914
913
  """
915
914
  return pulumi.get(self, "slot")
916
915
 
917
916
  @slot.setter
918
- def slot(self, value: Optional[pulumi.Input[builtins.str]]):
917
+ def slot(self, value: Optional[pulumi.Input[_builtins.str]]):
919
918
  pulumi.set(self, "slot", value)
920
919
 
921
- @property
920
+ @_builtins.property
922
921
  @pulumi.getter(name="tokenLabel")
923
- def token_label(self) -> Optional[pulumi.Input[builtins.str]]:
922
+ def token_label(self) -> Optional[pulumi.Input[_builtins.str]]:
924
923
  """
925
924
  The slot token label to use
926
925
  """
927
926
  return pulumi.get(self, "token_label")
928
927
 
929
928
  @token_label.setter
930
- def token_label(self, value: Optional[pulumi.Input[builtins.str]]):
929
+ def token_label(self, value: Optional[pulumi.Input[_builtins.str]]):
931
930
  pulumi.set(self, "token_label", value)
932
931
 
933
- @property
932
+ @_builtins.property
934
933
  @pulumi.getter
935
- def uuid(self) -> Optional[pulumi.Input[builtins.str]]:
934
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
936
935
  """
937
936
  ID of the managed key read from Vault
938
937
  """
939
938
  return pulumi.get(self, "uuid")
940
939
 
941
940
  @uuid.setter
942
- def uuid(self, value: Optional[pulumi.Input[builtins.str]]):
941
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
943
942
  pulumi.set(self, "uuid", value)
944
943
 
945
944