pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/managed/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -28,59 +27,59 @@ MYPY = False
|
|
28
27
|
|
29
28
|
if not MYPY:
|
30
29
|
class KeysAwArgsDict(TypedDict):
|
31
|
-
access_key: pulumi.Input[
|
30
|
+
access_key: pulumi.Input[_builtins.str]
|
32
31
|
"""
|
33
32
|
The AWS access key to use
|
34
33
|
"""
|
35
|
-
key_bits: pulumi.Input[
|
34
|
+
key_bits: pulumi.Input[_builtins.str]
|
36
35
|
"""
|
37
36
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
38
37
|
"""
|
39
|
-
key_type: pulumi.Input[
|
38
|
+
key_type: pulumi.Input[_builtins.str]
|
40
39
|
"""
|
41
40
|
The type of key to use
|
42
41
|
"""
|
43
|
-
kms_key: pulumi.Input[
|
42
|
+
kms_key: pulumi.Input[_builtins.str]
|
44
43
|
"""
|
45
44
|
An identifier for the key
|
46
45
|
"""
|
47
|
-
name: pulumi.Input[
|
46
|
+
name: pulumi.Input[_builtins.str]
|
48
47
|
"""
|
49
48
|
A unique lowercase name that serves as identifying the key
|
50
49
|
"""
|
51
|
-
secret_key: pulumi.Input[
|
50
|
+
secret_key: pulumi.Input[_builtins.str]
|
52
51
|
"""
|
53
52
|
The AWS secret key to use
|
54
53
|
"""
|
55
|
-
allow_generate_key: NotRequired[pulumi.Input[
|
54
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
56
55
|
"""
|
57
56
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
58
57
|
"""
|
59
|
-
allow_replace_key: NotRequired[pulumi.Input[
|
58
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
60
59
|
"""
|
61
60
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
62
61
|
"""
|
63
|
-
allow_store_key: NotRequired[pulumi.Input[
|
62
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
64
63
|
"""
|
65
64
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
66
65
|
"""
|
67
|
-
any_mount: NotRequired[pulumi.Input[
|
66
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
68
67
|
"""
|
69
68
|
Allow usage from any mount point within the namespace if 'true'
|
70
69
|
"""
|
71
|
-
curve: NotRequired[pulumi.Input[
|
70
|
+
curve: NotRequired[pulumi.Input[_builtins.str]]
|
72
71
|
"""
|
73
72
|
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
74
73
|
"""
|
75
|
-
endpoint: NotRequired[pulumi.Input[
|
74
|
+
endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
76
75
|
"""
|
77
76
|
Used to specify a custom AWS endpoint
|
78
77
|
"""
|
79
|
-
region: NotRequired[pulumi.Input[
|
78
|
+
region: NotRequired[pulumi.Input[_builtins.str]]
|
80
79
|
"""
|
81
80
|
The AWS region where the keys are stored (or will be stored)
|
82
81
|
"""
|
83
|
-
uuid: NotRequired[pulumi.Input[
|
82
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
84
83
|
"""
|
85
84
|
ID of the managed key read from Vault
|
86
85
|
"""
|
@@ -90,35 +89,35 @@ elif False:
|
|
90
89
|
@pulumi.input_type
|
91
90
|
class KeysAwArgs:
|
92
91
|
def __init__(__self__, *,
|
93
|
-
access_key: pulumi.Input[
|
94
|
-
key_bits: pulumi.Input[
|
95
|
-
key_type: pulumi.Input[
|
96
|
-
kms_key: pulumi.Input[
|
97
|
-
name: pulumi.Input[
|
98
|
-
secret_key: pulumi.Input[
|
99
|
-
allow_generate_key: Optional[pulumi.Input[
|
100
|
-
allow_replace_key: Optional[pulumi.Input[
|
101
|
-
allow_store_key: Optional[pulumi.Input[
|
102
|
-
any_mount: Optional[pulumi.Input[
|
103
|
-
curve: Optional[pulumi.Input[
|
104
|
-
endpoint: Optional[pulumi.Input[
|
105
|
-
region: Optional[pulumi.Input[
|
106
|
-
uuid: Optional[pulumi.Input[
|
107
|
-
"""
|
108
|
-
:param pulumi.Input[
|
109
|
-
:param pulumi.Input[
|
110
|
-
:param pulumi.Input[
|
111
|
-
:param pulumi.Input[
|
112
|
-
:param pulumi.Input[
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
115
|
-
:param pulumi.Input[
|
116
|
-
:param pulumi.Input[
|
117
|
-
:param pulumi.Input[
|
118
|
-
:param pulumi.Input[
|
119
|
-
:param pulumi.Input[
|
120
|
-
:param pulumi.Input[
|
121
|
-
:param pulumi.Input[
|
92
|
+
access_key: pulumi.Input[_builtins.str],
|
93
|
+
key_bits: pulumi.Input[_builtins.str],
|
94
|
+
key_type: pulumi.Input[_builtins.str],
|
95
|
+
kms_key: pulumi.Input[_builtins.str],
|
96
|
+
name: pulumi.Input[_builtins.str],
|
97
|
+
secret_key: pulumi.Input[_builtins.str],
|
98
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
99
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
100
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
101
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
102
|
+
curve: Optional[pulumi.Input[_builtins.str]] = None,
|
103
|
+
endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
104
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
105
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
106
|
+
"""
|
107
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS access key to use
|
108
|
+
:param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
109
|
+
:param pulumi.Input[_builtins.str] key_type: The type of key to use
|
110
|
+
:param pulumi.Input[_builtins.str] kms_key: An identifier for the key
|
111
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
112
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS secret key to use
|
113
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
114
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
115
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
116
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
117
|
+
:param pulumi.Input[_builtins.str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
118
|
+
:param pulumi.Input[_builtins.str] endpoint: Used to specify a custom AWS endpoint
|
119
|
+
:param pulumi.Input[_builtins.str] region: The AWS region where the keys are stored (or will be stored)
|
120
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
122
121
|
"""
|
123
122
|
pulumi.set(__self__, "access_key", access_key)
|
124
123
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -143,234 +142,234 @@ class KeysAwArgs:
|
|
143
142
|
if uuid is not None:
|
144
143
|
pulumi.set(__self__, "uuid", uuid)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter(name="accessKey")
|
148
|
-
def access_key(self) -> pulumi.Input[
|
147
|
+
def access_key(self) -> pulumi.Input[_builtins.str]:
|
149
148
|
"""
|
150
149
|
The AWS access key to use
|
151
150
|
"""
|
152
151
|
return pulumi.get(self, "access_key")
|
153
152
|
|
154
153
|
@access_key.setter
|
155
|
-
def access_key(self, value: pulumi.Input[
|
154
|
+
def access_key(self, value: pulumi.Input[_builtins.str]):
|
156
155
|
pulumi.set(self, "access_key", value)
|
157
156
|
|
158
|
-
@property
|
157
|
+
@_builtins.property
|
159
158
|
@pulumi.getter(name="keyBits")
|
160
|
-
def key_bits(self) -> pulumi.Input[
|
159
|
+
def key_bits(self) -> pulumi.Input[_builtins.str]:
|
161
160
|
"""
|
162
161
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
163
162
|
"""
|
164
163
|
return pulumi.get(self, "key_bits")
|
165
164
|
|
166
165
|
@key_bits.setter
|
167
|
-
def key_bits(self, value: pulumi.Input[
|
166
|
+
def key_bits(self, value: pulumi.Input[_builtins.str]):
|
168
167
|
pulumi.set(self, "key_bits", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter(name="keyType")
|
172
|
-
def key_type(self) -> pulumi.Input[
|
171
|
+
def key_type(self) -> pulumi.Input[_builtins.str]:
|
173
172
|
"""
|
174
173
|
The type of key to use
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "key_type")
|
177
176
|
|
178
177
|
@key_type.setter
|
179
|
-
def key_type(self, value: pulumi.Input[
|
178
|
+
def key_type(self, value: pulumi.Input[_builtins.str]):
|
180
179
|
pulumi.set(self, "key_type", value)
|
181
180
|
|
182
|
-
@property
|
181
|
+
@_builtins.property
|
183
182
|
@pulumi.getter(name="kmsKey")
|
184
|
-
def kms_key(self) -> pulumi.Input[
|
183
|
+
def kms_key(self) -> pulumi.Input[_builtins.str]:
|
185
184
|
"""
|
186
185
|
An identifier for the key
|
187
186
|
"""
|
188
187
|
return pulumi.get(self, "kms_key")
|
189
188
|
|
190
189
|
@kms_key.setter
|
191
|
-
def kms_key(self, value: pulumi.Input[
|
190
|
+
def kms_key(self, value: pulumi.Input[_builtins.str]):
|
192
191
|
pulumi.set(self, "kms_key", value)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter
|
196
|
-
def name(self) -> pulumi.Input[
|
195
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
197
196
|
"""
|
198
197
|
A unique lowercase name that serves as identifying the key
|
199
198
|
"""
|
200
199
|
return pulumi.get(self, "name")
|
201
200
|
|
202
201
|
@name.setter
|
203
|
-
def name(self, value: pulumi.Input[
|
202
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
204
203
|
pulumi.set(self, "name", value)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter(name="secretKey")
|
208
|
-
def secret_key(self) -> pulumi.Input[
|
207
|
+
def secret_key(self) -> pulumi.Input[_builtins.str]:
|
209
208
|
"""
|
210
209
|
The AWS secret key to use
|
211
210
|
"""
|
212
211
|
return pulumi.get(self, "secret_key")
|
213
212
|
|
214
213
|
@secret_key.setter
|
215
|
-
def secret_key(self, value: pulumi.Input[
|
214
|
+
def secret_key(self, value: pulumi.Input[_builtins.str]):
|
216
215
|
pulumi.set(self, "secret_key", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter(name="allowGenerateKey")
|
220
|
-
def allow_generate_key(self) -> Optional[pulumi.Input[
|
219
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
221
220
|
"""
|
222
221
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "allow_generate_key")
|
225
224
|
|
226
225
|
@allow_generate_key.setter
|
227
|
-
def allow_generate_key(self, value: Optional[pulumi.Input[
|
226
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
228
227
|
pulumi.set(self, "allow_generate_key", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="allowReplaceKey")
|
232
|
-
def allow_replace_key(self) -> Optional[pulumi.Input[
|
231
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
233
232
|
"""
|
234
233
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
235
234
|
"""
|
236
235
|
return pulumi.get(self, "allow_replace_key")
|
237
236
|
|
238
237
|
@allow_replace_key.setter
|
239
|
-
def allow_replace_key(self, value: Optional[pulumi.Input[
|
238
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
240
239
|
pulumi.set(self, "allow_replace_key", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter(name="allowStoreKey")
|
244
|
-
def allow_store_key(self) -> Optional[pulumi.Input[
|
243
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
245
244
|
"""
|
246
245
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "allow_store_key")
|
249
248
|
|
250
249
|
@allow_store_key.setter
|
251
|
-
def allow_store_key(self, value: Optional[pulumi.Input[
|
250
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
252
251
|
pulumi.set(self, "allow_store_key", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter(name="anyMount")
|
256
|
-
def any_mount(self) -> Optional[pulumi.Input[
|
255
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
257
256
|
"""
|
258
257
|
Allow usage from any mount point within the namespace if 'true'
|
259
258
|
"""
|
260
259
|
return pulumi.get(self, "any_mount")
|
261
260
|
|
262
261
|
@any_mount.setter
|
263
|
-
def any_mount(self, value: Optional[pulumi.Input[
|
262
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
264
263
|
pulumi.set(self, "any_mount", value)
|
265
264
|
|
266
|
-
@property
|
265
|
+
@_builtins.property
|
267
266
|
@pulumi.getter
|
268
|
-
def curve(self) -> Optional[pulumi.Input[
|
267
|
+
def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
|
269
268
|
"""
|
270
269
|
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
271
270
|
"""
|
272
271
|
return pulumi.get(self, "curve")
|
273
272
|
|
274
273
|
@curve.setter
|
275
|
-
def curve(self, value: Optional[pulumi.Input[
|
274
|
+
def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
|
276
275
|
pulumi.set(self, "curve", value)
|
277
276
|
|
278
|
-
@property
|
277
|
+
@_builtins.property
|
279
278
|
@pulumi.getter
|
280
|
-
def endpoint(self) -> Optional[pulumi.Input[
|
279
|
+
def endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
281
280
|
"""
|
282
281
|
Used to specify a custom AWS endpoint
|
283
282
|
"""
|
284
283
|
return pulumi.get(self, "endpoint")
|
285
284
|
|
286
285
|
@endpoint.setter
|
287
|
-
def endpoint(self, value: Optional[pulumi.Input[
|
286
|
+
def endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
288
287
|
pulumi.set(self, "endpoint", value)
|
289
288
|
|
290
|
-
@property
|
289
|
+
@_builtins.property
|
291
290
|
@pulumi.getter
|
292
|
-
def region(self) -> Optional[pulumi.Input[
|
291
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
293
292
|
"""
|
294
293
|
The AWS region where the keys are stored (or will be stored)
|
295
294
|
"""
|
296
295
|
return pulumi.get(self, "region")
|
297
296
|
|
298
297
|
@region.setter
|
299
|
-
def region(self, value: Optional[pulumi.Input[
|
298
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
299
|
pulumi.set(self, "region", value)
|
301
300
|
|
302
|
-
@property
|
301
|
+
@_builtins.property
|
303
302
|
@pulumi.getter
|
304
|
-
def uuid(self) -> Optional[pulumi.Input[
|
303
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
305
304
|
"""
|
306
305
|
ID of the managed key read from Vault
|
307
306
|
"""
|
308
307
|
return pulumi.get(self, "uuid")
|
309
308
|
|
310
309
|
@uuid.setter
|
311
|
-
def uuid(self, value: Optional[pulumi.Input[
|
310
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
312
311
|
pulumi.set(self, "uuid", value)
|
313
312
|
|
314
313
|
|
315
314
|
if not MYPY:
|
316
315
|
class KeysAzureArgsDict(TypedDict):
|
317
|
-
client_id: pulumi.Input[
|
316
|
+
client_id: pulumi.Input[_builtins.str]
|
318
317
|
"""
|
319
318
|
The client id for credentials to query the Azure APIs
|
320
319
|
"""
|
321
|
-
client_secret: pulumi.Input[
|
320
|
+
client_secret: pulumi.Input[_builtins.str]
|
322
321
|
"""
|
323
322
|
The client secret for credentials to query the Azure APIs
|
324
323
|
"""
|
325
|
-
key_name: pulumi.Input[
|
324
|
+
key_name: pulumi.Input[_builtins.str]
|
326
325
|
"""
|
327
326
|
The Key Vault key to use for encryption and decryption
|
328
327
|
"""
|
329
|
-
key_type: pulumi.Input[
|
328
|
+
key_type: pulumi.Input[_builtins.str]
|
330
329
|
"""
|
331
330
|
The type of key to use
|
332
331
|
"""
|
333
|
-
name: pulumi.Input[
|
332
|
+
name: pulumi.Input[_builtins.str]
|
334
333
|
"""
|
335
334
|
A unique lowercase name that serves as identifying the key
|
336
335
|
"""
|
337
|
-
tenant_id: pulumi.Input[
|
336
|
+
tenant_id: pulumi.Input[_builtins.str]
|
338
337
|
"""
|
339
338
|
The tenant id for the Azure Active Directory organization
|
340
339
|
"""
|
341
|
-
vault_name: pulumi.Input[
|
340
|
+
vault_name: pulumi.Input[_builtins.str]
|
342
341
|
"""
|
343
342
|
The Key Vault vault to use the encryption keys for encryption and decryption
|
344
343
|
"""
|
345
|
-
allow_generate_key: NotRequired[pulumi.Input[
|
344
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
346
345
|
"""
|
347
346
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
348
347
|
"""
|
349
|
-
allow_replace_key: NotRequired[pulumi.Input[
|
348
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
350
349
|
"""
|
351
350
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
352
351
|
"""
|
353
|
-
allow_store_key: NotRequired[pulumi.Input[
|
352
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
354
353
|
"""
|
355
354
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
356
355
|
"""
|
357
|
-
any_mount: NotRequired[pulumi.Input[
|
356
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
358
357
|
"""
|
359
358
|
Allow usage from any mount point within the namespace if 'true'
|
360
359
|
"""
|
361
|
-
environment: NotRequired[pulumi.Input[
|
360
|
+
environment: NotRequired[pulumi.Input[_builtins.str]]
|
362
361
|
"""
|
363
362
|
The Azure Cloud environment API endpoints to use
|
364
363
|
"""
|
365
|
-
key_bits: NotRequired[pulumi.Input[
|
364
|
+
key_bits: NotRequired[pulumi.Input[_builtins.str]]
|
366
365
|
"""
|
367
366
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
368
367
|
"""
|
369
|
-
resource: NotRequired[pulumi.Input[
|
368
|
+
resource: NotRequired[pulumi.Input[_builtins.str]]
|
370
369
|
"""
|
371
370
|
The Azure Key Vault resource's DNS Suffix to connect to
|
372
371
|
"""
|
373
|
-
uuid: NotRequired[pulumi.Input[
|
372
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
374
373
|
"""
|
375
374
|
ID of the managed key read from Vault
|
376
375
|
"""
|
@@ -380,37 +379,37 @@ elif False:
|
|
380
379
|
@pulumi.input_type
|
381
380
|
class KeysAzureArgs:
|
382
381
|
def __init__(__self__, *,
|
383
|
-
client_id: pulumi.Input[
|
384
|
-
client_secret: pulumi.Input[
|
385
|
-
key_name: pulumi.Input[
|
386
|
-
key_type: pulumi.Input[
|
387
|
-
name: pulumi.Input[
|
388
|
-
tenant_id: pulumi.Input[
|
389
|
-
vault_name: pulumi.Input[
|
390
|
-
allow_generate_key: Optional[pulumi.Input[
|
391
|
-
allow_replace_key: Optional[pulumi.Input[
|
392
|
-
allow_store_key: Optional[pulumi.Input[
|
393
|
-
any_mount: Optional[pulumi.Input[
|
394
|
-
environment: Optional[pulumi.Input[
|
395
|
-
key_bits: Optional[pulumi.Input[
|
396
|
-
resource: Optional[pulumi.Input[
|
397
|
-
uuid: Optional[pulumi.Input[
|
398
|
-
"""
|
399
|
-
:param pulumi.Input[
|
400
|
-
:param pulumi.Input[
|
401
|
-
:param pulumi.Input[
|
402
|
-
:param pulumi.Input[
|
403
|
-
:param pulumi.Input[
|
404
|
-
:param pulumi.Input[
|
405
|
-
:param pulumi.Input[
|
406
|
-
:param pulumi.Input[
|
407
|
-
:param pulumi.Input[
|
408
|
-
:param pulumi.Input[
|
409
|
-
:param pulumi.Input[
|
410
|
-
:param pulumi.Input[
|
411
|
-
:param pulumi.Input[
|
412
|
-
:param pulumi.Input[
|
413
|
-
:param pulumi.Input[
|
382
|
+
client_id: pulumi.Input[_builtins.str],
|
383
|
+
client_secret: pulumi.Input[_builtins.str],
|
384
|
+
key_name: pulumi.Input[_builtins.str],
|
385
|
+
key_type: pulumi.Input[_builtins.str],
|
386
|
+
name: pulumi.Input[_builtins.str],
|
387
|
+
tenant_id: pulumi.Input[_builtins.str],
|
388
|
+
vault_name: pulumi.Input[_builtins.str],
|
389
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
390
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
391
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
392
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
393
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
394
|
+
key_bits: Optional[pulumi.Input[_builtins.str]] = None,
|
395
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
396
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
397
|
+
"""
|
398
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs
|
399
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the Azure APIs
|
400
|
+
:param pulumi.Input[_builtins.str] key_name: The Key Vault key to use for encryption and decryption
|
401
|
+
:param pulumi.Input[_builtins.str] key_type: The type of key to use
|
402
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
403
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory organization
|
404
|
+
:param pulumi.Input[_builtins.str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
405
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
406
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
407
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
408
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
409
|
+
:param pulumi.Input[_builtins.str] environment: The Azure Cloud environment API endpoints to use
|
410
|
+
:param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
411
|
+
:param pulumi.Input[_builtins.str] resource: The Azure Key Vault resource's DNS Suffix to connect to
|
412
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
414
413
|
"""
|
415
414
|
pulumi.set(__self__, "client_id", client_id)
|
416
415
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -436,250 +435,250 @@ class KeysAzureArgs:
|
|
436
435
|
if uuid is not None:
|
437
436
|
pulumi.set(__self__, "uuid", uuid)
|
438
437
|
|
439
|
-
@property
|
438
|
+
@_builtins.property
|
440
439
|
@pulumi.getter(name="clientId")
|
441
|
-
def client_id(self) -> pulumi.Input[
|
440
|
+
def client_id(self) -> pulumi.Input[_builtins.str]:
|
442
441
|
"""
|
443
442
|
The client id for credentials to query the Azure APIs
|
444
443
|
"""
|
445
444
|
return pulumi.get(self, "client_id")
|
446
445
|
|
447
446
|
@client_id.setter
|
448
|
-
def client_id(self, value: pulumi.Input[
|
447
|
+
def client_id(self, value: pulumi.Input[_builtins.str]):
|
449
448
|
pulumi.set(self, "client_id", value)
|
450
449
|
|
451
|
-
@property
|
450
|
+
@_builtins.property
|
452
451
|
@pulumi.getter(name="clientSecret")
|
453
|
-
def client_secret(self) -> pulumi.Input[
|
452
|
+
def client_secret(self) -> pulumi.Input[_builtins.str]:
|
454
453
|
"""
|
455
454
|
The client secret for credentials to query the Azure APIs
|
456
455
|
"""
|
457
456
|
return pulumi.get(self, "client_secret")
|
458
457
|
|
459
458
|
@client_secret.setter
|
460
|
-
def client_secret(self, value: pulumi.Input[
|
459
|
+
def client_secret(self, value: pulumi.Input[_builtins.str]):
|
461
460
|
pulumi.set(self, "client_secret", value)
|
462
461
|
|
463
|
-
@property
|
462
|
+
@_builtins.property
|
464
463
|
@pulumi.getter(name="keyName")
|
465
|
-
def key_name(self) -> pulumi.Input[
|
464
|
+
def key_name(self) -> pulumi.Input[_builtins.str]:
|
466
465
|
"""
|
467
466
|
The Key Vault key to use for encryption and decryption
|
468
467
|
"""
|
469
468
|
return pulumi.get(self, "key_name")
|
470
469
|
|
471
470
|
@key_name.setter
|
472
|
-
def key_name(self, value: pulumi.Input[
|
471
|
+
def key_name(self, value: pulumi.Input[_builtins.str]):
|
473
472
|
pulumi.set(self, "key_name", value)
|
474
473
|
|
475
|
-
@property
|
474
|
+
@_builtins.property
|
476
475
|
@pulumi.getter(name="keyType")
|
477
|
-
def key_type(self) -> pulumi.Input[
|
476
|
+
def key_type(self) -> pulumi.Input[_builtins.str]:
|
478
477
|
"""
|
479
478
|
The type of key to use
|
480
479
|
"""
|
481
480
|
return pulumi.get(self, "key_type")
|
482
481
|
|
483
482
|
@key_type.setter
|
484
|
-
def key_type(self, value: pulumi.Input[
|
483
|
+
def key_type(self, value: pulumi.Input[_builtins.str]):
|
485
484
|
pulumi.set(self, "key_type", value)
|
486
485
|
|
487
|
-
@property
|
486
|
+
@_builtins.property
|
488
487
|
@pulumi.getter
|
489
|
-
def name(self) -> pulumi.Input[
|
488
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
490
489
|
"""
|
491
490
|
A unique lowercase name that serves as identifying the key
|
492
491
|
"""
|
493
492
|
return pulumi.get(self, "name")
|
494
493
|
|
495
494
|
@name.setter
|
496
|
-
def name(self, value: pulumi.Input[
|
495
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
497
496
|
pulumi.set(self, "name", value)
|
498
497
|
|
499
|
-
@property
|
498
|
+
@_builtins.property
|
500
499
|
@pulumi.getter(name="tenantId")
|
501
|
-
def tenant_id(self) -> pulumi.Input[
|
500
|
+
def tenant_id(self) -> pulumi.Input[_builtins.str]:
|
502
501
|
"""
|
503
502
|
The tenant id for the Azure Active Directory organization
|
504
503
|
"""
|
505
504
|
return pulumi.get(self, "tenant_id")
|
506
505
|
|
507
506
|
@tenant_id.setter
|
508
|
-
def tenant_id(self, value: pulumi.Input[
|
507
|
+
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
509
508
|
pulumi.set(self, "tenant_id", value)
|
510
509
|
|
511
|
-
@property
|
510
|
+
@_builtins.property
|
512
511
|
@pulumi.getter(name="vaultName")
|
513
|
-
def vault_name(self) -> pulumi.Input[
|
512
|
+
def vault_name(self) -> pulumi.Input[_builtins.str]:
|
514
513
|
"""
|
515
514
|
The Key Vault vault to use the encryption keys for encryption and decryption
|
516
515
|
"""
|
517
516
|
return pulumi.get(self, "vault_name")
|
518
517
|
|
519
518
|
@vault_name.setter
|
520
|
-
def vault_name(self, value: pulumi.Input[
|
519
|
+
def vault_name(self, value: pulumi.Input[_builtins.str]):
|
521
520
|
pulumi.set(self, "vault_name", value)
|
522
521
|
|
523
|
-
@property
|
522
|
+
@_builtins.property
|
524
523
|
@pulumi.getter(name="allowGenerateKey")
|
525
|
-
def allow_generate_key(self) -> Optional[pulumi.Input[
|
524
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
526
525
|
"""
|
527
526
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
528
527
|
"""
|
529
528
|
return pulumi.get(self, "allow_generate_key")
|
530
529
|
|
531
530
|
@allow_generate_key.setter
|
532
|
-
def allow_generate_key(self, value: Optional[pulumi.Input[
|
531
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
533
532
|
pulumi.set(self, "allow_generate_key", value)
|
534
533
|
|
535
|
-
@property
|
534
|
+
@_builtins.property
|
536
535
|
@pulumi.getter(name="allowReplaceKey")
|
537
|
-
def allow_replace_key(self) -> Optional[pulumi.Input[
|
536
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
538
537
|
"""
|
539
538
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
540
539
|
"""
|
541
540
|
return pulumi.get(self, "allow_replace_key")
|
542
541
|
|
543
542
|
@allow_replace_key.setter
|
544
|
-
def allow_replace_key(self, value: Optional[pulumi.Input[
|
543
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
545
544
|
pulumi.set(self, "allow_replace_key", value)
|
546
545
|
|
547
|
-
@property
|
546
|
+
@_builtins.property
|
548
547
|
@pulumi.getter(name="allowStoreKey")
|
549
|
-
def allow_store_key(self) -> Optional[pulumi.Input[
|
548
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
550
549
|
"""
|
551
550
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
552
551
|
"""
|
553
552
|
return pulumi.get(self, "allow_store_key")
|
554
553
|
|
555
554
|
@allow_store_key.setter
|
556
|
-
def allow_store_key(self, value: Optional[pulumi.Input[
|
555
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
557
556
|
pulumi.set(self, "allow_store_key", value)
|
558
557
|
|
559
|
-
@property
|
558
|
+
@_builtins.property
|
560
559
|
@pulumi.getter(name="anyMount")
|
561
|
-
def any_mount(self) -> Optional[pulumi.Input[
|
560
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
562
561
|
"""
|
563
562
|
Allow usage from any mount point within the namespace if 'true'
|
564
563
|
"""
|
565
564
|
return pulumi.get(self, "any_mount")
|
566
565
|
|
567
566
|
@any_mount.setter
|
568
|
-
def any_mount(self, value: Optional[pulumi.Input[
|
567
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
569
568
|
pulumi.set(self, "any_mount", value)
|
570
569
|
|
571
|
-
@property
|
570
|
+
@_builtins.property
|
572
571
|
@pulumi.getter
|
573
|
-
def environment(self) -> Optional[pulumi.Input[
|
572
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
574
573
|
"""
|
575
574
|
The Azure Cloud environment API endpoints to use
|
576
575
|
"""
|
577
576
|
return pulumi.get(self, "environment")
|
578
577
|
|
579
578
|
@environment.setter
|
580
|
-
def environment(self, value: Optional[pulumi.Input[
|
579
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
581
580
|
pulumi.set(self, "environment", value)
|
582
581
|
|
583
|
-
@property
|
582
|
+
@_builtins.property
|
584
583
|
@pulumi.getter(name="keyBits")
|
585
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
584
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
|
586
585
|
"""
|
587
586
|
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
588
587
|
"""
|
589
588
|
return pulumi.get(self, "key_bits")
|
590
589
|
|
591
590
|
@key_bits.setter
|
592
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
591
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
|
593
592
|
pulumi.set(self, "key_bits", value)
|
594
593
|
|
595
|
-
@property
|
594
|
+
@_builtins.property
|
596
595
|
@pulumi.getter
|
597
|
-
def resource(self) -> Optional[pulumi.Input[
|
596
|
+
def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
|
598
597
|
"""
|
599
598
|
The Azure Key Vault resource's DNS Suffix to connect to
|
600
599
|
"""
|
601
600
|
return pulumi.get(self, "resource")
|
602
601
|
|
603
602
|
@resource.setter
|
604
|
-
def resource(self, value: Optional[pulumi.Input[
|
603
|
+
def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
|
605
604
|
pulumi.set(self, "resource", value)
|
606
605
|
|
607
|
-
@property
|
606
|
+
@_builtins.property
|
608
607
|
@pulumi.getter
|
609
|
-
def uuid(self) -> Optional[pulumi.Input[
|
608
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
610
609
|
"""
|
611
610
|
ID of the managed key read from Vault
|
612
611
|
"""
|
613
612
|
return pulumi.get(self, "uuid")
|
614
613
|
|
615
614
|
@uuid.setter
|
616
|
-
def uuid(self, value: Optional[pulumi.Input[
|
615
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
617
616
|
pulumi.set(self, "uuid", value)
|
618
617
|
|
619
618
|
|
620
619
|
if not MYPY:
|
621
620
|
class KeysPkcArgsDict(TypedDict):
|
622
|
-
key_id: pulumi.Input[
|
621
|
+
key_id: pulumi.Input[_builtins.str]
|
623
622
|
"""
|
624
623
|
The id of a PKCS#11 key to use
|
625
624
|
"""
|
626
|
-
key_label: pulumi.Input[
|
625
|
+
key_label: pulumi.Input[_builtins.str]
|
627
626
|
"""
|
628
627
|
The label of the key to use
|
629
628
|
"""
|
630
|
-
library: pulumi.Input[
|
629
|
+
library: pulumi.Input[_builtins.str]
|
631
630
|
"""
|
632
631
|
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
633
632
|
"""
|
634
|
-
mechanism: pulumi.Input[
|
633
|
+
mechanism: pulumi.Input[_builtins.str]
|
635
634
|
"""
|
636
635
|
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
637
636
|
"""
|
638
|
-
name: pulumi.Input[
|
637
|
+
name: pulumi.Input[_builtins.str]
|
639
638
|
"""
|
640
639
|
A unique lowercase name that serves as identifying the key
|
641
640
|
"""
|
642
|
-
pin: pulumi.Input[
|
641
|
+
pin: pulumi.Input[_builtins.str]
|
643
642
|
"""
|
644
643
|
The PIN for login
|
645
644
|
"""
|
646
|
-
allow_generate_key: NotRequired[pulumi.Input[
|
645
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
647
646
|
"""
|
648
647
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
649
648
|
"""
|
650
|
-
allow_replace_key: NotRequired[pulumi.Input[
|
649
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
651
650
|
"""
|
652
651
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
653
652
|
"""
|
654
|
-
allow_store_key: NotRequired[pulumi.Input[
|
653
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
655
654
|
"""
|
656
655
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
657
656
|
"""
|
658
|
-
any_mount: NotRequired[pulumi.Input[
|
657
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
659
658
|
"""
|
660
659
|
Allow usage from any mount point within the namespace if 'true'
|
661
660
|
"""
|
662
|
-
curve: NotRequired[pulumi.Input[
|
661
|
+
curve: NotRequired[pulumi.Input[_builtins.str]]
|
663
662
|
"""
|
664
663
|
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
665
664
|
"""
|
666
|
-
force_rw_session: NotRequired[pulumi.Input[
|
665
|
+
force_rw_session: NotRequired[pulumi.Input[_builtins.str]]
|
667
666
|
"""
|
668
667
|
Force all operations to open up a read-write session to the HSM
|
669
668
|
"""
|
670
|
-
key_bits: NotRequired[pulumi.Input[
|
669
|
+
key_bits: NotRequired[pulumi.Input[_builtins.str]]
|
671
670
|
"""
|
672
671
|
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
673
672
|
"""
|
674
|
-
slot: NotRequired[pulumi.Input[
|
673
|
+
slot: NotRequired[pulumi.Input[_builtins.str]]
|
675
674
|
"""
|
676
675
|
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
677
676
|
"""
|
678
|
-
token_label: NotRequired[pulumi.Input[
|
677
|
+
token_label: NotRequired[pulumi.Input[_builtins.str]]
|
679
678
|
"""
|
680
679
|
The slot token label to use
|
681
680
|
"""
|
682
|
-
uuid: NotRequired[pulumi.Input[
|
681
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
683
682
|
"""
|
684
683
|
ID of the managed key read from Vault
|
685
684
|
"""
|
@@ -689,39 +688,39 @@ elif False:
|
|
689
688
|
@pulumi.input_type
|
690
689
|
class KeysPkcArgs:
|
691
690
|
def __init__(__self__, *,
|
692
|
-
key_id: pulumi.Input[
|
693
|
-
key_label: pulumi.Input[
|
694
|
-
library: pulumi.Input[
|
695
|
-
mechanism: pulumi.Input[
|
696
|
-
name: pulumi.Input[
|
697
|
-
pin: pulumi.Input[
|
698
|
-
allow_generate_key: Optional[pulumi.Input[
|
699
|
-
allow_replace_key: Optional[pulumi.Input[
|
700
|
-
allow_store_key: Optional[pulumi.Input[
|
701
|
-
any_mount: Optional[pulumi.Input[
|
702
|
-
curve: Optional[pulumi.Input[
|
703
|
-
force_rw_session: Optional[pulumi.Input[
|
704
|
-
key_bits: Optional[pulumi.Input[
|
705
|
-
slot: Optional[pulumi.Input[
|
706
|
-
token_label: Optional[pulumi.Input[
|
707
|
-
uuid: Optional[pulumi.Input[
|
708
|
-
"""
|
709
|
-
:param pulumi.Input[
|
710
|
-
:param pulumi.Input[
|
711
|
-
:param pulumi.Input[
|
712
|
-
:param pulumi.Input[
|
713
|
-
:param pulumi.Input[
|
714
|
-
:param pulumi.Input[
|
715
|
-
:param pulumi.Input[
|
716
|
-
:param pulumi.Input[
|
717
|
-
:param pulumi.Input[
|
718
|
-
:param pulumi.Input[
|
719
|
-
:param pulumi.Input[
|
720
|
-
:param pulumi.Input[
|
721
|
-
:param pulumi.Input[
|
722
|
-
:param pulumi.Input[
|
723
|
-
:param pulumi.Input[
|
724
|
-
:param pulumi.Input[
|
691
|
+
key_id: pulumi.Input[_builtins.str],
|
692
|
+
key_label: pulumi.Input[_builtins.str],
|
693
|
+
library: pulumi.Input[_builtins.str],
|
694
|
+
mechanism: pulumi.Input[_builtins.str],
|
695
|
+
name: pulumi.Input[_builtins.str],
|
696
|
+
pin: pulumi.Input[_builtins.str],
|
697
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
698
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
699
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
700
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
701
|
+
curve: Optional[pulumi.Input[_builtins.str]] = None,
|
702
|
+
force_rw_session: Optional[pulumi.Input[_builtins.str]] = None,
|
703
|
+
key_bits: Optional[pulumi.Input[_builtins.str]] = None,
|
704
|
+
slot: Optional[pulumi.Input[_builtins.str]] = None,
|
705
|
+
token_label: Optional[pulumi.Input[_builtins.str]] = None,
|
706
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
707
|
+
"""
|
708
|
+
:param pulumi.Input[_builtins.str] key_id: The id of a PKCS#11 key to use
|
709
|
+
:param pulumi.Input[_builtins.str] key_label: The label of the key to use
|
710
|
+
:param pulumi.Input[_builtins.str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
711
|
+
:param pulumi.Input[_builtins.str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
712
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
713
|
+
:param pulumi.Input[_builtins.str] pin: The PIN for login
|
714
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
715
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
716
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
717
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
718
|
+
:param pulumi.Input[_builtins.str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
719
|
+
:param pulumi.Input[_builtins.str] force_rw_session: Force all operations to open up a read-write session to the HSM
|
720
|
+
:param pulumi.Input[_builtins.str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
721
|
+
:param pulumi.Input[_builtins.str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
722
|
+
:param pulumi.Input[_builtins.str] token_label: The slot token label to use
|
723
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
725
724
|
"""
|
726
725
|
pulumi.set(__self__, "key_id", key_id)
|
727
726
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -750,196 +749,196 @@ class KeysPkcArgs:
|
|
750
749
|
if uuid is not None:
|
751
750
|
pulumi.set(__self__, "uuid", uuid)
|
752
751
|
|
753
|
-
@property
|
752
|
+
@_builtins.property
|
754
753
|
@pulumi.getter(name="keyId")
|
755
|
-
def key_id(self) -> pulumi.Input[
|
754
|
+
def key_id(self) -> pulumi.Input[_builtins.str]:
|
756
755
|
"""
|
757
756
|
The id of a PKCS#11 key to use
|
758
757
|
"""
|
759
758
|
return pulumi.get(self, "key_id")
|
760
759
|
|
761
760
|
@key_id.setter
|
762
|
-
def key_id(self, value: pulumi.Input[
|
761
|
+
def key_id(self, value: pulumi.Input[_builtins.str]):
|
763
762
|
pulumi.set(self, "key_id", value)
|
764
763
|
|
765
|
-
@property
|
764
|
+
@_builtins.property
|
766
765
|
@pulumi.getter(name="keyLabel")
|
767
|
-
def key_label(self) -> pulumi.Input[
|
766
|
+
def key_label(self) -> pulumi.Input[_builtins.str]:
|
768
767
|
"""
|
769
768
|
The label of the key to use
|
770
769
|
"""
|
771
770
|
return pulumi.get(self, "key_label")
|
772
771
|
|
773
772
|
@key_label.setter
|
774
|
-
def key_label(self, value: pulumi.Input[
|
773
|
+
def key_label(self, value: pulumi.Input[_builtins.str]):
|
775
774
|
pulumi.set(self, "key_label", value)
|
776
775
|
|
777
|
-
@property
|
776
|
+
@_builtins.property
|
778
777
|
@pulumi.getter
|
779
|
-
def library(self) -> pulumi.Input[
|
778
|
+
def library(self) -> pulumi.Input[_builtins.str]:
|
780
779
|
"""
|
781
780
|
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
782
781
|
"""
|
783
782
|
return pulumi.get(self, "library")
|
784
783
|
|
785
784
|
@library.setter
|
786
|
-
def library(self, value: pulumi.Input[
|
785
|
+
def library(self, value: pulumi.Input[_builtins.str]):
|
787
786
|
pulumi.set(self, "library", value)
|
788
787
|
|
789
|
-
@property
|
788
|
+
@_builtins.property
|
790
789
|
@pulumi.getter
|
791
|
-
def mechanism(self) -> pulumi.Input[
|
790
|
+
def mechanism(self) -> pulumi.Input[_builtins.str]:
|
792
791
|
"""
|
793
792
|
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
794
793
|
"""
|
795
794
|
return pulumi.get(self, "mechanism")
|
796
795
|
|
797
796
|
@mechanism.setter
|
798
|
-
def mechanism(self, value: pulumi.Input[
|
797
|
+
def mechanism(self, value: pulumi.Input[_builtins.str]):
|
799
798
|
pulumi.set(self, "mechanism", value)
|
800
799
|
|
801
|
-
@property
|
800
|
+
@_builtins.property
|
802
801
|
@pulumi.getter
|
803
|
-
def name(self) -> pulumi.Input[
|
802
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
804
803
|
"""
|
805
804
|
A unique lowercase name that serves as identifying the key
|
806
805
|
"""
|
807
806
|
return pulumi.get(self, "name")
|
808
807
|
|
809
808
|
@name.setter
|
810
|
-
def name(self, value: pulumi.Input[
|
809
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
811
810
|
pulumi.set(self, "name", value)
|
812
811
|
|
813
|
-
@property
|
812
|
+
@_builtins.property
|
814
813
|
@pulumi.getter
|
815
|
-
def pin(self) -> pulumi.Input[
|
814
|
+
def pin(self) -> pulumi.Input[_builtins.str]:
|
816
815
|
"""
|
817
816
|
The PIN for login
|
818
817
|
"""
|
819
818
|
return pulumi.get(self, "pin")
|
820
819
|
|
821
820
|
@pin.setter
|
822
|
-
def pin(self, value: pulumi.Input[
|
821
|
+
def pin(self, value: pulumi.Input[_builtins.str]):
|
823
822
|
pulumi.set(self, "pin", value)
|
824
823
|
|
825
|
-
@property
|
824
|
+
@_builtins.property
|
826
825
|
@pulumi.getter(name="allowGenerateKey")
|
827
|
-
def allow_generate_key(self) -> Optional[pulumi.Input[
|
826
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
828
827
|
"""
|
829
828
|
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
830
829
|
"""
|
831
830
|
return pulumi.get(self, "allow_generate_key")
|
832
831
|
|
833
832
|
@allow_generate_key.setter
|
834
|
-
def allow_generate_key(self, value: Optional[pulumi.Input[
|
833
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
835
834
|
pulumi.set(self, "allow_generate_key", value)
|
836
835
|
|
837
|
-
@property
|
836
|
+
@_builtins.property
|
838
837
|
@pulumi.getter(name="allowReplaceKey")
|
839
|
-
def allow_replace_key(self) -> Optional[pulumi.Input[
|
838
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
840
839
|
"""
|
841
840
|
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
842
841
|
"""
|
843
842
|
return pulumi.get(self, "allow_replace_key")
|
844
843
|
|
845
844
|
@allow_replace_key.setter
|
846
|
-
def allow_replace_key(self, value: Optional[pulumi.Input[
|
845
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
847
846
|
pulumi.set(self, "allow_replace_key", value)
|
848
847
|
|
849
|
-
@property
|
848
|
+
@_builtins.property
|
850
849
|
@pulumi.getter(name="allowStoreKey")
|
851
|
-
def allow_store_key(self) -> Optional[pulumi.Input[
|
850
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
852
851
|
"""
|
853
852
|
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
854
853
|
"""
|
855
854
|
return pulumi.get(self, "allow_store_key")
|
856
855
|
|
857
856
|
@allow_store_key.setter
|
858
|
-
def allow_store_key(self, value: Optional[pulumi.Input[
|
857
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
859
858
|
pulumi.set(self, "allow_store_key", value)
|
860
859
|
|
861
|
-
@property
|
860
|
+
@_builtins.property
|
862
861
|
@pulumi.getter(name="anyMount")
|
863
|
-
def any_mount(self) -> Optional[pulumi.Input[
|
862
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
864
863
|
"""
|
865
864
|
Allow usage from any mount point within the namespace if 'true'
|
866
865
|
"""
|
867
866
|
return pulumi.get(self, "any_mount")
|
868
867
|
|
869
868
|
@any_mount.setter
|
870
|
-
def any_mount(self, value: Optional[pulumi.Input[
|
869
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
871
870
|
pulumi.set(self, "any_mount", value)
|
872
871
|
|
873
|
-
@property
|
872
|
+
@_builtins.property
|
874
873
|
@pulumi.getter
|
875
|
-
def curve(self) -> Optional[pulumi.Input[
|
874
|
+
def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
|
876
875
|
"""
|
877
876
|
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
878
877
|
"""
|
879
878
|
return pulumi.get(self, "curve")
|
880
879
|
|
881
880
|
@curve.setter
|
882
|
-
def curve(self, value: Optional[pulumi.Input[
|
881
|
+
def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
|
883
882
|
pulumi.set(self, "curve", value)
|
884
883
|
|
885
|
-
@property
|
884
|
+
@_builtins.property
|
886
885
|
@pulumi.getter(name="forceRwSession")
|
887
|
-
def force_rw_session(self) -> Optional[pulumi.Input[
|
886
|
+
def force_rw_session(self) -> Optional[pulumi.Input[_builtins.str]]:
|
888
887
|
"""
|
889
888
|
Force all operations to open up a read-write session to the HSM
|
890
889
|
"""
|
891
890
|
return pulumi.get(self, "force_rw_session")
|
892
891
|
|
893
892
|
@force_rw_session.setter
|
894
|
-
def force_rw_session(self, value: Optional[pulumi.Input[
|
893
|
+
def force_rw_session(self, value: Optional[pulumi.Input[_builtins.str]]):
|
895
894
|
pulumi.set(self, "force_rw_session", value)
|
896
895
|
|
897
|
-
@property
|
896
|
+
@_builtins.property
|
898
897
|
@pulumi.getter(name="keyBits")
|
899
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
898
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
|
900
899
|
"""
|
901
900
|
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
902
901
|
"""
|
903
902
|
return pulumi.get(self, "key_bits")
|
904
903
|
|
905
904
|
@key_bits.setter
|
906
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
905
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
|
907
906
|
pulumi.set(self, "key_bits", value)
|
908
907
|
|
909
|
-
@property
|
908
|
+
@_builtins.property
|
910
909
|
@pulumi.getter
|
911
|
-
def slot(self) -> Optional[pulumi.Input[
|
910
|
+
def slot(self) -> Optional[pulumi.Input[_builtins.str]]:
|
912
911
|
"""
|
913
912
|
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
914
913
|
"""
|
915
914
|
return pulumi.get(self, "slot")
|
916
915
|
|
917
916
|
@slot.setter
|
918
|
-
def slot(self, value: Optional[pulumi.Input[
|
917
|
+
def slot(self, value: Optional[pulumi.Input[_builtins.str]]):
|
919
918
|
pulumi.set(self, "slot", value)
|
920
919
|
|
921
|
-
@property
|
920
|
+
@_builtins.property
|
922
921
|
@pulumi.getter(name="tokenLabel")
|
923
|
-
def token_label(self) -> Optional[pulumi.Input[
|
922
|
+
def token_label(self) -> Optional[pulumi.Input[_builtins.str]]:
|
924
923
|
"""
|
925
924
|
The slot token label to use
|
926
925
|
"""
|
927
926
|
return pulumi.get(self, "token_label")
|
928
927
|
|
929
928
|
@token_label.setter
|
930
|
-
def token_label(self, value: Optional[pulumi.Input[
|
929
|
+
def token_label(self, value: Optional[pulumi.Input[_builtins.str]]):
|
931
930
|
pulumi.set(self, "token_label", value)
|
932
931
|
|
933
|
-
@property
|
932
|
+
@_builtins.property
|
934
933
|
@pulumi.getter
|
935
|
-
def uuid(self) -> Optional[pulumi.Input[
|
934
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
936
935
|
"""
|
937
936
|
ID of the managed key read from Vault
|
938
937
|
"""
|
939
938
|
return pulumi.get(self, "uuid")
|
940
939
|
|
941
940
|
@uuid.setter
|
942
|
-
def uuid(self, value: Optional[pulumi.Input[
|
941
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
943
942
|
pulumi.set(self, "uuid", value)
|
944
943
|
|
945
944
|
|