pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -57,35 +56,35 @@ class KeysAw(dict):
57
56
  return super().get(key, default)
58
57
 
59
58
  def __init__(__self__, *,
60
- access_key: builtins.str,
61
- key_bits: builtins.str,
62
- key_type: builtins.str,
63
- kms_key: builtins.str,
64
- name: builtins.str,
65
- secret_key: builtins.str,
66
- allow_generate_key: Optional[builtins.bool] = None,
67
- allow_replace_key: Optional[builtins.bool] = None,
68
- allow_store_key: Optional[builtins.bool] = None,
69
- any_mount: Optional[builtins.bool] = None,
70
- curve: Optional[builtins.str] = None,
71
- endpoint: Optional[builtins.str] = None,
72
- region: Optional[builtins.str] = None,
73
- uuid: Optional[builtins.str] = None):
74
- """
75
- :param builtins.str access_key: The AWS access key to use
76
- :param builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
77
- :param builtins.str key_type: The type of key to use
78
- :param builtins.str kms_key: An identifier for the key
79
- :param builtins.str name: A unique lowercase name that serves as identifying the key
80
- :param builtins.str secret_key: The AWS secret key to use
81
- :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
82
- :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
83
- :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
84
- :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
85
- :param builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
86
- :param builtins.str endpoint: Used to specify a custom AWS endpoint
87
- :param builtins.str region: The AWS region where the keys are stored (or will be stored)
88
- :param builtins.str uuid: ID of the managed key read from Vault
59
+ access_key: _builtins.str,
60
+ key_bits: _builtins.str,
61
+ key_type: _builtins.str,
62
+ kms_key: _builtins.str,
63
+ name: _builtins.str,
64
+ secret_key: _builtins.str,
65
+ allow_generate_key: Optional[_builtins.bool] = None,
66
+ allow_replace_key: Optional[_builtins.bool] = None,
67
+ allow_store_key: Optional[_builtins.bool] = None,
68
+ any_mount: Optional[_builtins.bool] = None,
69
+ curve: Optional[_builtins.str] = None,
70
+ endpoint: Optional[_builtins.str] = None,
71
+ region: Optional[_builtins.str] = None,
72
+ uuid: Optional[_builtins.str] = None):
73
+ """
74
+ :param _builtins.str access_key: The AWS access key to use
75
+ :param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
76
+ :param _builtins.str key_type: The type of key to use
77
+ :param _builtins.str kms_key: An identifier for the key
78
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
79
+ :param _builtins.str secret_key: The AWS secret key to use
80
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
81
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
82
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
83
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
84
+ :param _builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
85
+ :param _builtins.str endpoint: Used to specify a custom AWS endpoint
86
+ :param _builtins.str region: The AWS region where the keys are stored (or will be stored)
87
+ :param _builtins.str uuid: ID of the managed key read from Vault
89
88
  """
90
89
  pulumi.set(__self__, "access_key", access_key)
91
90
  pulumi.set(__self__, "key_bits", key_bits)
@@ -110,113 +109,113 @@ class KeysAw(dict):
110
109
  if uuid is not None:
111
110
  pulumi.set(__self__, "uuid", uuid)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter(name="accessKey")
115
- def access_key(self) -> builtins.str:
114
+ def access_key(self) -> _builtins.str:
116
115
  """
117
116
  The AWS access key to use
118
117
  """
119
118
  return pulumi.get(self, "access_key")
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter(name="keyBits")
123
- def key_bits(self) -> builtins.str:
122
+ def key_bits(self) -> _builtins.str:
124
123
  """
125
124
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
126
125
  """
127
126
  return pulumi.get(self, "key_bits")
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="keyType")
131
- def key_type(self) -> builtins.str:
130
+ def key_type(self) -> _builtins.str:
132
131
  """
133
132
  The type of key to use
134
133
  """
135
134
  return pulumi.get(self, "key_type")
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter(name="kmsKey")
139
- def kms_key(self) -> builtins.str:
138
+ def kms_key(self) -> _builtins.str:
140
139
  """
141
140
  An identifier for the key
142
141
  """
143
142
  return pulumi.get(self, "kms_key")
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter
147
- def name(self) -> builtins.str:
146
+ def name(self) -> _builtins.str:
148
147
  """
149
148
  A unique lowercase name that serves as identifying the key
150
149
  """
151
150
  return pulumi.get(self, "name")
152
151
 
153
- @property
152
+ @_builtins.property
154
153
  @pulumi.getter(name="secretKey")
155
- def secret_key(self) -> builtins.str:
154
+ def secret_key(self) -> _builtins.str:
156
155
  """
157
156
  The AWS secret key to use
158
157
  """
159
158
  return pulumi.get(self, "secret_key")
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="allowGenerateKey")
163
- def allow_generate_key(self) -> Optional[builtins.bool]:
162
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
164
163
  """
165
164
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
166
165
  """
167
166
  return pulumi.get(self, "allow_generate_key")
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter(name="allowReplaceKey")
171
- def allow_replace_key(self) -> Optional[builtins.bool]:
170
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
172
171
  """
173
172
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
174
173
  """
175
174
  return pulumi.get(self, "allow_replace_key")
176
175
 
177
- @property
176
+ @_builtins.property
178
177
  @pulumi.getter(name="allowStoreKey")
179
- def allow_store_key(self) -> Optional[builtins.bool]:
178
+ def allow_store_key(self) -> Optional[_builtins.bool]:
180
179
  """
181
180
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
182
181
  """
183
182
  return pulumi.get(self, "allow_store_key")
184
183
 
185
- @property
184
+ @_builtins.property
186
185
  @pulumi.getter(name="anyMount")
187
- def any_mount(self) -> Optional[builtins.bool]:
186
+ def any_mount(self) -> Optional[_builtins.bool]:
188
187
  """
189
188
  Allow usage from any mount point within the namespace if 'true'
190
189
  """
191
190
  return pulumi.get(self, "any_mount")
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter
195
- def curve(self) -> Optional[builtins.str]:
194
+ def curve(self) -> Optional[_builtins.str]:
196
195
  """
197
196
  The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
198
197
  """
199
198
  return pulumi.get(self, "curve")
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter
203
- def endpoint(self) -> Optional[builtins.str]:
202
+ def endpoint(self) -> Optional[_builtins.str]:
204
203
  """
205
204
  Used to specify a custom AWS endpoint
206
205
  """
207
206
  return pulumi.get(self, "endpoint")
208
207
 
209
- @property
208
+ @_builtins.property
210
209
  @pulumi.getter
211
- def region(self) -> Optional[builtins.str]:
210
+ def region(self) -> Optional[_builtins.str]:
212
211
  """
213
212
  The AWS region where the keys are stored (or will be stored)
214
213
  """
215
214
  return pulumi.get(self, "region")
216
215
 
217
- @property
216
+ @_builtins.property
218
217
  @pulumi.getter
219
- def uuid(self) -> Optional[builtins.str]:
218
+ def uuid(self) -> Optional[_builtins.str]:
220
219
  """
221
220
  ID of the managed key read from Vault
222
221
  """
@@ -263,37 +262,37 @@ class KeysAzure(dict):
263
262
  return super().get(key, default)
264
263
 
265
264
  def __init__(__self__, *,
266
- client_id: builtins.str,
267
- client_secret: builtins.str,
268
- key_name: builtins.str,
269
- key_type: builtins.str,
270
- name: builtins.str,
271
- tenant_id: builtins.str,
272
- vault_name: builtins.str,
273
- allow_generate_key: Optional[builtins.bool] = None,
274
- allow_replace_key: Optional[builtins.bool] = None,
275
- allow_store_key: Optional[builtins.bool] = None,
276
- any_mount: Optional[builtins.bool] = None,
277
- environment: Optional[builtins.str] = None,
278
- key_bits: Optional[builtins.str] = None,
279
- resource: Optional[builtins.str] = None,
280
- uuid: Optional[builtins.str] = None):
281
- """
282
- :param builtins.str client_id: The client id for credentials to query the Azure APIs
283
- :param builtins.str client_secret: The client secret for credentials to query the Azure APIs
284
- :param builtins.str key_name: The Key Vault key to use for encryption and decryption
285
- :param builtins.str key_type: The type of key to use
286
- :param builtins.str name: A unique lowercase name that serves as identifying the key
287
- :param builtins.str tenant_id: The tenant id for the Azure Active Directory organization
288
- :param builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
289
- :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
290
- :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
291
- :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
292
- :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
293
- :param builtins.str environment: The Azure Cloud environment API endpoints to use
294
- :param builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
295
- :param builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
296
- :param builtins.str uuid: ID of the managed key read from Vault
265
+ client_id: _builtins.str,
266
+ client_secret: _builtins.str,
267
+ key_name: _builtins.str,
268
+ key_type: _builtins.str,
269
+ name: _builtins.str,
270
+ tenant_id: _builtins.str,
271
+ vault_name: _builtins.str,
272
+ allow_generate_key: Optional[_builtins.bool] = None,
273
+ allow_replace_key: Optional[_builtins.bool] = None,
274
+ allow_store_key: Optional[_builtins.bool] = None,
275
+ any_mount: Optional[_builtins.bool] = None,
276
+ environment: Optional[_builtins.str] = None,
277
+ key_bits: Optional[_builtins.str] = None,
278
+ resource: Optional[_builtins.str] = None,
279
+ uuid: Optional[_builtins.str] = None):
280
+ """
281
+ :param _builtins.str client_id: The client id for credentials to query the Azure APIs
282
+ :param _builtins.str client_secret: The client secret for credentials to query the Azure APIs
283
+ :param _builtins.str key_name: The Key Vault key to use for encryption and decryption
284
+ :param _builtins.str key_type: The type of key to use
285
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
286
+ :param _builtins.str tenant_id: The tenant id for the Azure Active Directory organization
287
+ :param _builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
288
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
289
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
290
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
291
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
292
+ :param _builtins.str environment: The Azure Cloud environment API endpoints to use
293
+ :param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
294
+ :param _builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
295
+ :param _builtins.str uuid: ID of the managed key read from Vault
297
296
  """
298
297
  pulumi.set(__self__, "client_id", client_id)
299
298
  pulumi.set(__self__, "client_secret", client_secret)
@@ -319,121 +318,121 @@ class KeysAzure(dict):
319
318
  if uuid is not None:
320
319
  pulumi.set(__self__, "uuid", uuid)
321
320
 
322
- @property
321
+ @_builtins.property
323
322
  @pulumi.getter(name="clientId")
324
- def client_id(self) -> builtins.str:
323
+ def client_id(self) -> _builtins.str:
325
324
  """
326
325
  The client id for credentials to query the Azure APIs
327
326
  """
328
327
  return pulumi.get(self, "client_id")
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter(name="clientSecret")
332
- def client_secret(self) -> builtins.str:
331
+ def client_secret(self) -> _builtins.str:
333
332
  """
334
333
  The client secret for credentials to query the Azure APIs
335
334
  """
336
335
  return pulumi.get(self, "client_secret")
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="keyName")
340
- def key_name(self) -> builtins.str:
339
+ def key_name(self) -> _builtins.str:
341
340
  """
342
341
  The Key Vault key to use for encryption and decryption
343
342
  """
344
343
  return pulumi.get(self, "key_name")
345
344
 
346
- @property
345
+ @_builtins.property
347
346
  @pulumi.getter(name="keyType")
348
- def key_type(self) -> builtins.str:
347
+ def key_type(self) -> _builtins.str:
349
348
  """
350
349
  The type of key to use
351
350
  """
352
351
  return pulumi.get(self, "key_type")
353
352
 
354
- @property
353
+ @_builtins.property
355
354
  @pulumi.getter
356
- def name(self) -> builtins.str:
355
+ def name(self) -> _builtins.str:
357
356
  """
358
357
  A unique lowercase name that serves as identifying the key
359
358
  """
360
359
  return pulumi.get(self, "name")
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="tenantId")
364
- def tenant_id(self) -> builtins.str:
363
+ def tenant_id(self) -> _builtins.str:
365
364
  """
366
365
  The tenant id for the Azure Active Directory organization
367
366
  """
368
367
  return pulumi.get(self, "tenant_id")
369
368
 
370
- @property
369
+ @_builtins.property
371
370
  @pulumi.getter(name="vaultName")
372
- def vault_name(self) -> builtins.str:
371
+ def vault_name(self) -> _builtins.str:
373
372
  """
374
373
  The Key Vault vault to use the encryption keys for encryption and decryption
375
374
  """
376
375
  return pulumi.get(self, "vault_name")
377
376
 
378
- @property
377
+ @_builtins.property
379
378
  @pulumi.getter(name="allowGenerateKey")
380
- def allow_generate_key(self) -> Optional[builtins.bool]:
379
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
381
380
  """
382
381
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
383
382
  """
384
383
  return pulumi.get(self, "allow_generate_key")
385
384
 
386
- @property
385
+ @_builtins.property
387
386
  @pulumi.getter(name="allowReplaceKey")
388
- def allow_replace_key(self) -> Optional[builtins.bool]:
387
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
389
388
  """
390
389
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
391
390
  """
392
391
  return pulumi.get(self, "allow_replace_key")
393
392
 
394
- @property
393
+ @_builtins.property
395
394
  @pulumi.getter(name="allowStoreKey")
396
- def allow_store_key(self) -> Optional[builtins.bool]:
395
+ def allow_store_key(self) -> Optional[_builtins.bool]:
397
396
  """
398
397
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
399
398
  """
400
399
  return pulumi.get(self, "allow_store_key")
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter(name="anyMount")
404
- def any_mount(self) -> Optional[builtins.bool]:
403
+ def any_mount(self) -> Optional[_builtins.bool]:
405
404
  """
406
405
  Allow usage from any mount point within the namespace if 'true'
407
406
  """
408
407
  return pulumi.get(self, "any_mount")
409
408
 
410
- @property
409
+ @_builtins.property
411
410
  @pulumi.getter
412
- def environment(self) -> Optional[builtins.str]:
411
+ def environment(self) -> Optional[_builtins.str]:
413
412
  """
414
413
  The Azure Cloud environment API endpoints to use
415
414
  """
416
415
  return pulumi.get(self, "environment")
417
416
 
418
- @property
417
+ @_builtins.property
419
418
  @pulumi.getter(name="keyBits")
420
- def key_bits(self) -> Optional[builtins.str]:
419
+ def key_bits(self) -> Optional[_builtins.str]:
421
420
  """
422
421
  The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
423
422
  """
424
423
  return pulumi.get(self, "key_bits")
425
424
 
426
- @property
425
+ @_builtins.property
427
426
  @pulumi.getter
428
- def resource(self) -> Optional[builtins.str]:
427
+ def resource(self) -> Optional[_builtins.str]:
429
428
  """
430
429
  The Azure Key Vault resource's DNS Suffix to connect to
431
430
  """
432
431
  return pulumi.get(self, "resource")
433
432
 
434
- @property
433
+ @_builtins.property
435
434
  @pulumi.getter
436
- def uuid(self) -> Optional[builtins.str]:
435
+ def uuid(self) -> Optional[_builtins.str]:
437
436
  """
438
437
  ID of the managed key read from Vault
439
438
  """
@@ -476,39 +475,39 @@ class KeysPkc(dict):
476
475
  return super().get(key, default)
477
476
 
478
477
  def __init__(__self__, *,
479
- key_id: builtins.str,
480
- key_label: builtins.str,
481
- library: builtins.str,
482
- mechanism: builtins.str,
483
- name: builtins.str,
484
- pin: builtins.str,
485
- allow_generate_key: Optional[builtins.bool] = None,
486
- allow_replace_key: Optional[builtins.bool] = None,
487
- allow_store_key: Optional[builtins.bool] = None,
488
- any_mount: Optional[builtins.bool] = None,
489
- curve: Optional[builtins.str] = None,
490
- force_rw_session: Optional[builtins.str] = None,
491
- key_bits: Optional[builtins.str] = None,
492
- slot: Optional[builtins.str] = None,
493
- token_label: Optional[builtins.str] = None,
494
- uuid: Optional[builtins.str] = None):
495
- """
496
- :param builtins.str key_id: The id of a PKCS#11 key to use
497
- :param builtins.str key_label: The label of the key to use
498
- :param builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
499
- :param builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
500
- :param builtins.str name: A unique lowercase name that serves as identifying the key
501
- :param builtins.str pin: The PIN for login
502
- :param builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
503
- :param builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
504
- :param builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
505
- :param builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
506
- :param builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
507
- :param builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
508
- :param builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
509
- :param builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
510
- :param builtins.str token_label: The slot token label to use
511
- :param builtins.str uuid: ID of the managed key read from Vault
478
+ key_id: _builtins.str,
479
+ key_label: _builtins.str,
480
+ library: _builtins.str,
481
+ mechanism: _builtins.str,
482
+ name: _builtins.str,
483
+ pin: _builtins.str,
484
+ allow_generate_key: Optional[_builtins.bool] = None,
485
+ allow_replace_key: Optional[_builtins.bool] = None,
486
+ allow_store_key: Optional[_builtins.bool] = None,
487
+ any_mount: Optional[_builtins.bool] = None,
488
+ curve: Optional[_builtins.str] = None,
489
+ force_rw_session: Optional[_builtins.str] = None,
490
+ key_bits: Optional[_builtins.str] = None,
491
+ slot: Optional[_builtins.str] = None,
492
+ token_label: Optional[_builtins.str] = None,
493
+ uuid: Optional[_builtins.str] = None):
494
+ """
495
+ :param _builtins.str key_id: The id of a PKCS#11 key to use
496
+ :param _builtins.str key_label: The label of the key to use
497
+ :param _builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
498
+ :param _builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
499
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
500
+ :param _builtins.str pin: The PIN for login
501
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
502
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
503
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
504
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
505
+ :param _builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
506
+ :param _builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
507
+ :param _builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
508
+ :param _builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
509
+ :param _builtins.str token_label: The slot token label to use
510
+ :param _builtins.str uuid: ID of the managed key read from Vault
512
511
  """
513
512
  pulumi.set(__self__, "key_id", key_id)
514
513
  pulumi.set(__self__, "key_label", key_label)
@@ -537,129 +536,129 @@ class KeysPkc(dict):
537
536
  if uuid is not None:
538
537
  pulumi.set(__self__, "uuid", uuid)
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter(name="keyId")
542
- def key_id(self) -> builtins.str:
541
+ def key_id(self) -> _builtins.str:
543
542
  """
544
543
  The id of a PKCS#11 key to use
545
544
  """
546
545
  return pulumi.get(self, "key_id")
547
546
 
548
- @property
547
+ @_builtins.property
549
548
  @pulumi.getter(name="keyLabel")
550
- def key_label(self) -> builtins.str:
549
+ def key_label(self) -> _builtins.str:
551
550
  """
552
551
  The label of the key to use
553
552
  """
554
553
  return pulumi.get(self, "key_label")
555
554
 
556
- @property
555
+ @_builtins.property
557
556
  @pulumi.getter
558
- def library(self) -> builtins.str:
557
+ def library(self) -> _builtins.str:
559
558
  """
560
559
  The name of the kms_library stanza to use from Vault's config to lookup the local library path
561
560
  """
562
561
  return pulumi.get(self, "library")
563
562
 
564
- @property
563
+ @_builtins.property
565
564
  @pulumi.getter
566
- def mechanism(self) -> builtins.str:
565
+ def mechanism(self) -> _builtins.str:
567
566
  """
568
567
  The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
569
568
  """
570
569
  return pulumi.get(self, "mechanism")
571
570
 
572
- @property
571
+ @_builtins.property
573
572
  @pulumi.getter
574
- def name(self) -> builtins.str:
573
+ def name(self) -> _builtins.str:
575
574
  """
576
575
  A unique lowercase name that serves as identifying the key
577
576
  """
578
577
  return pulumi.get(self, "name")
579
578
 
580
- @property
579
+ @_builtins.property
581
580
  @pulumi.getter
582
- def pin(self) -> builtins.str:
581
+ def pin(self) -> _builtins.str:
583
582
  """
584
583
  The PIN for login
585
584
  """
586
585
  return pulumi.get(self, "pin")
587
586
 
588
- @property
587
+ @_builtins.property
589
588
  @pulumi.getter(name="allowGenerateKey")
590
- def allow_generate_key(self) -> Optional[builtins.bool]:
589
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
591
590
  """
592
591
  If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
593
592
  """
594
593
  return pulumi.get(self, "allow_generate_key")
595
594
 
596
- @property
595
+ @_builtins.property
597
596
  @pulumi.getter(name="allowReplaceKey")
598
- def allow_replace_key(self) -> Optional[builtins.bool]:
597
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
599
598
  """
600
599
  Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
601
600
  """
602
601
  return pulumi.get(self, "allow_replace_key")
603
602
 
604
- @property
603
+ @_builtins.property
605
604
  @pulumi.getter(name="allowStoreKey")
606
- def allow_store_key(self) -> Optional[builtins.bool]:
605
+ def allow_store_key(self) -> Optional[_builtins.bool]:
607
606
  """
608
607
  Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
609
608
  """
610
609
  return pulumi.get(self, "allow_store_key")
611
610
 
612
- @property
611
+ @_builtins.property
613
612
  @pulumi.getter(name="anyMount")
614
- def any_mount(self) -> Optional[builtins.bool]:
613
+ def any_mount(self) -> Optional[_builtins.bool]:
615
614
  """
616
615
  Allow usage from any mount point within the namespace if 'true'
617
616
  """
618
617
  return pulumi.get(self, "any_mount")
619
618
 
620
- @property
619
+ @_builtins.property
621
620
  @pulumi.getter
622
- def curve(self) -> Optional[builtins.str]:
621
+ def curve(self) -> Optional[_builtins.str]:
623
622
  """
624
623
  Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
625
624
  """
626
625
  return pulumi.get(self, "curve")
627
626
 
628
- @property
627
+ @_builtins.property
629
628
  @pulumi.getter(name="forceRwSession")
630
- def force_rw_session(self) -> Optional[builtins.str]:
629
+ def force_rw_session(self) -> Optional[_builtins.str]:
631
630
  """
632
631
  Force all operations to open up a read-write session to the HSM
633
632
  """
634
633
  return pulumi.get(self, "force_rw_session")
635
634
 
636
- @property
635
+ @_builtins.property
637
636
  @pulumi.getter(name="keyBits")
638
- def key_bits(self) -> Optional[builtins.str]:
637
+ def key_bits(self) -> Optional[_builtins.str]:
639
638
  """
640
639
  Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
641
640
  """
642
641
  return pulumi.get(self, "key_bits")
643
642
 
644
- @property
643
+ @_builtins.property
645
644
  @pulumi.getter
646
- def slot(self) -> Optional[builtins.str]:
645
+ def slot(self) -> Optional[_builtins.str]:
647
646
  """
648
647
  The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
649
648
  """
650
649
  return pulumi.get(self, "slot")
651
650
 
652
- @property
651
+ @_builtins.property
653
652
  @pulumi.getter(name="tokenLabel")
654
- def token_label(self) -> Optional[builtins.str]:
653
+ def token_label(self) -> Optional[_builtins.str]:
655
654
  """
656
655
  The slot token label to use
657
656
  """
658
657
  return pulumi.get(self, "token_label")
659
658
 
660
- @property
659
+ @_builtins.property
661
660
  @pulumi.getter
662
- def uuid(self) -> Optional[builtins.str]:
661
+ def uuid(self) -> Optional[_builtins.str]:
663
662
  """
664
663
  ID of the managed key read from Vault
665
664
  """