pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,28 +19,28 @@ __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendKeyArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
type: pulumi.Input[
|
25
|
-
key_bits: Optional[pulumi.Input[
|
26
|
-
key_name: Optional[pulumi.Input[
|
27
|
-
key_type: Optional[pulumi.Input[
|
28
|
-
managed_key_id: Optional[pulumi.Input[
|
29
|
-
managed_key_name: Optional[pulumi.Input[
|
30
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
type: pulumi.Input[_builtins.str],
|
24
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
25
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretBackendKey resource.
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
33
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
34
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the number of bits to use for the generated keys.
|
36
35
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
37
36
|
2048 (default), 3072, or 4096; with `key_type=ec`, allowed values are: 224, 256 (default),
|
38
37
|
384, or 521; ignored with `key_type=ed25519`.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] key_name: When a new key is created with this request, optionally specifies the name for this.
|
40
39
|
The global ref `default` may not be used as a name.
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
41
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The managed key's UUID.
|
42
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The managed key's configured name.
|
43
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
45
44
|
The value should not contain leading or trailing forward slashes.
|
46
45
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
46
|
*Available only for Vault Enterprise*.
|
@@ -61,33 +60,33 @@ class SecretBackendKeyArgs:
|
|
61
60
|
if namespace is not None:
|
62
61
|
pulumi.set(__self__, "namespace", namespace)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def backend(self) -> pulumi.Input[
|
65
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
67
66
|
"""
|
68
67
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
69
68
|
"""
|
70
69
|
return pulumi.get(self, "backend")
|
71
70
|
|
72
71
|
@backend.setter
|
73
|
-
def backend(self, value: pulumi.Input[
|
72
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
74
73
|
pulumi.set(self, "backend", value)
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter
|
78
|
-
def type(self) -> pulumi.Input[
|
77
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
79
78
|
"""
|
80
79
|
Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
81
80
|
"""
|
82
81
|
return pulumi.get(self, "type")
|
83
82
|
|
84
83
|
@type.setter
|
85
|
-
def type(self, value: pulumi.Input[
|
84
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
86
85
|
pulumi.set(self, "type", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="keyBits")
|
90
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
89
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
91
90
|
"""
|
92
91
|
Specifies the number of bits to use for the generated keys.
|
93
92
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
@@ -97,12 +96,12 @@ class SecretBackendKeyArgs:
|
|
97
96
|
return pulumi.get(self, "key_bits")
|
98
97
|
|
99
98
|
@key_bits.setter
|
100
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
99
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
101
100
|
pulumi.set(self, "key_bits", value)
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="keyName")
|
105
|
-
def key_name(self) -> Optional[pulumi.Input[
|
104
|
+
def key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
106
105
|
"""
|
107
106
|
When a new key is created with this request, optionally specifies the name for this.
|
108
107
|
The global ref `default` may not be used as a name.
|
@@ -110,48 +109,48 @@ class SecretBackendKeyArgs:
|
|
110
109
|
return pulumi.get(self, "key_name")
|
111
110
|
|
112
111
|
@key_name.setter
|
113
|
-
def key_name(self, value: Optional[pulumi.Input[
|
112
|
+
def key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
114
113
|
pulumi.set(self, "key_name", value)
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="keyType")
|
118
|
-
def key_type(self) -> Optional[pulumi.Input[
|
117
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
119
118
|
"""
|
120
119
|
Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
121
120
|
"""
|
122
121
|
return pulumi.get(self, "key_type")
|
123
122
|
|
124
123
|
@key_type.setter
|
125
|
-
def key_type(self, value: Optional[pulumi.Input[
|
124
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
126
125
|
pulumi.set(self, "key_type", value)
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter(name="managedKeyId")
|
130
|
-
def managed_key_id(self) -> Optional[pulumi.Input[
|
129
|
+
def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
131
130
|
"""
|
132
131
|
The managed key's UUID.
|
133
132
|
"""
|
134
133
|
return pulumi.get(self, "managed_key_id")
|
135
134
|
|
136
135
|
@managed_key_id.setter
|
137
|
-
def managed_key_id(self, value: Optional[pulumi.Input[
|
136
|
+
def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
138
137
|
pulumi.set(self, "managed_key_id", value)
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="managedKeyName")
|
142
|
-
def managed_key_name(self) -> Optional[pulumi.Input[
|
141
|
+
def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
143
142
|
"""
|
144
143
|
The managed key's configured name.
|
145
144
|
"""
|
146
145
|
return pulumi.get(self, "managed_key_name")
|
147
146
|
|
148
147
|
@managed_key_name.setter
|
149
|
-
def managed_key_name(self, value: Optional[pulumi.Input[
|
148
|
+
def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
149
|
pulumi.set(self, "managed_key_name", value)
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter
|
154
|
-
def namespace(self) -> Optional[pulumi.Input[
|
153
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
155
154
|
"""
|
156
155
|
The namespace to provision the resource in.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
@@ -161,40 +160,40 @@ class SecretBackendKeyArgs:
|
|
161
160
|
return pulumi.get(self, "namespace")
|
162
161
|
|
163
162
|
@namespace.setter
|
164
|
-
def namespace(self, value: Optional[pulumi.Input[
|
163
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
165
164
|
pulumi.set(self, "namespace", value)
|
166
165
|
|
167
166
|
|
168
167
|
@pulumi.input_type
|
169
168
|
class _SecretBackendKeyState:
|
170
169
|
def __init__(__self__, *,
|
171
|
-
backend: Optional[pulumi.Input[
|
172
|
-
key_bits: Optional[pulumi.Input[
|
173
|
-
key_id: Optional[pulumi.Input[
|
174
|
-
key_name: Optional[pulumi.Input[
|
175
|
-
key_type: Optional[pulumi.Input[
|
176
|
-
managed_key_id: Optional[pulumi.Input[
|
177
|
-
managed_key_name: Optional[pulumi.Input[
|
178
|
-
namespace: Optional[pulumi.Input[
|
179
|
-
type: Optional[pulumi.Input[
|
170
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
171
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
172
|
+
key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
173
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
174
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
176
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
177
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
178
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
180
179
|
"""
|
181
180
|
Input properties used for looking up and filtering SecretBackendKey resources.
|
182
|
-
:param pulumi.Input[
|
183
|
-
:param pulumi.Input[
|
181
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
182
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the number of bits to use for the generated keys.
|
184
183
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
185
184
|
2048 (default), 3072, or 4096; with `key_type=ec`, allowed values are: 224, 256 (default),
|
186
185
|
384, or 521; ignored with `key_type=ed25519`.
|
187
|
-
:param pulumi.Input[
|
188
|
-
:param pulumi.Input[
|
186
|
+
:param pulumi.Input[_builtins.str] key_id: ID of the generated key.
|
187
|
+
:param pulumi.Input[_builtins.str] key_name: When a new key is created with this request, optionally specifies the name for this.
|
189
188
|
The global ref `default` may not be used as a name.
|
190
|
-
:param pulumi.Input[
|
191
|
-
:param pulumi.Input[
|
192
|
-
:param pulumi.Input[
|
193
|
-
:param pulumi.Input[
|
189
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
190
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The managed key's UUID.
|
191
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The managed key's configured name.
|
192
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
194
193
|
The value should not contain leading or trailing forward slashes.
|
195
194
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
195
|
*Available only for Vault Enterprise*.
|
197
|
-
:param pulumi.Input[
|
196
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
198
197
|
"""
|
199
198
|
if backend is not None:
|
200
199
|
pulumi.set(__self__, "backend", backend)
|
@@ -215,21 +214,21 @@ class _SecretBackendKeyState:
|
|
215
214
|
if type is not None:
|
216
215
|
pulumi.set(__self__, "type", type)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter
|
220
|
-
def backend(self) -> Optional[pulumi.Input[
|
219
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
221
220
|
"""
|
222
221
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "backend")
|
225
224
|
|
226
225
|
@backend.setter
|
227
|
-
def backend(self, value: Optional[pulumi.Input[
|
226
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
228
227
|
pulumi.set(self, "backend", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="keyBits")
|
232
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
231
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
233
232
|
"""
|
234
233
|
Specifies the number of bits to use for the generated keys.
|
235
234
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
@@ -239,24 +238,24 @@ class _SecretBackendKeyState:
|
|
239
238
|
return pulumi.get(self, "key_bits")
|
240
239
|
|
241
240
|
@key_bits.setter
|
242
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
241
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
243
242
|
pulumi.set(self, "key_bits", value)
|
244
243
|
|
245
|
-
@property
|
244
|
+
@_builtins.property
|
246
245
|
@pulumi.getter(name="keyId")
|
247
|
-
def key_id(self) -> Optional[pulumi.Input[
|
246
|
+
def key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
248
247
|
"""
|
249
248
|
ID of the generated key.
|
250
249
|
"""
|
251
250
|
return pulumi.get(self, "key_id")
|
252
251
|
|
253
252
|
@key_id.setter
|
254
|
-
def key_id(self, value: Optional[pulumi.Input[
|
253
|
+
def key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
255
254
|
pulumi.set(self, "key_id", value)
|
256
255
|
|
257
|
-
@property
|
256
|
+
@_builtins.property
|
258
257
|
@pulumi.getter(name="keyName")
|
259
|
-
def key_name(self) -> Optional[pulumi.Input[
|
258
|
+
def key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
260
259
|
"""
|
261
260
|
When a new key is created with this request, optionally specifies the name for this.
|
262
261
|
The global ref `default` may not be used as a name.
|
@@ -264,48 +263,48 @@ class _SecretBackendKeyState:
|
|
264
263
|
return pulumi.get(self, "key_name")
|
265
264
|
|
266
265
|
@key_name.setter
|
267
|
-
def key_name(self, value: Optional[pulumi.Input[
|
266
|
+
def key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
268
267
|
pulumi.set(self, "key_name", value)
|
269
268
|
|
270
|
-
@property
|
269
|
+
@_builtins.property
|
271
270
|
@pulumi.getter(name="keyType")
|
272
|
-
def key_type(self) -> Optional[pulumi.Input[
|
271
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
273
272
|
"""
|
274
273
|
Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
275
274
|
"""
|
276
275
|
return pulumi.get(self, "key_type")
|
277
276
|
|
278
277
|
@key_type.setter
|
279
|
-
def key_type(self, value: Optional[pulumi.Input[
|
278
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
280
279
|
pulumi.set(self, "key_type", value)
|
281
280
|
|
282
|
-
@property
|
281
|
+
@_builtins.property
|
283
282
|
@pulumi.getter(name="managedKeyId")
|
284
|
-
def managed_key_id(self) -> Optional[pulumi.Input[
|
283
|
+
def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
285
284
|
"""
|
286
285
|
The managed key's UUID.
|
287
286
|
"""
|
288
287
|
return pulumi.get(self, "managed_key_id")
|
289
288
|
|
290
289
|
@managed_key_id.setter
|
291
|
-
def managed_key_id(self, value: Optional[pulumi.Input[
|
290
|
+
def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
292
291
|
pulumi.set(self, "managed_key_id", value)
|
293
292
|
|
294
|
-
@property
|
293
|
+
@_builtins.property
|
295
294
|
@pulumi.getter(name="managedKeyName")
|
296
|
-
def managed_key_name(self) -> Optional[pulumi.Input[
|
295
|
+
def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
297
296
|
"""
|
298
297
|
The managed key's configured name.
|
299
298
|
"""
|
300
299
|
return pulumi.get(self, "managed_key_name")
|
301
300
|
|
302
301
|
@managed_key_name.setter
|
303
|
-
def managed_key_name(self, value: Optional[pulumi.Input[
|
302
|
+
def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
304
303
|
pulumi.set(self, "managed_key_name", value)
|
305
304
|
|
306
|
-
@property
|
305
|
+
@_builtins.property
|
307
306
|
@pulumi.getter
|
308
|
-
def namespace(self) -> Optional[pulumi.Input[
|
307
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
309
308
|
"""
|
310
309
|
The namespace to provision the resource in.
|
311
310
|
The value should not contain leading or trailing forward slashes.
|
@@ -315,19 +314,19 @@ class _SecretBackendKeyState:
|
|
315
314
|
return pulumi.get(self, "namespace")
|
316
315
|
|
317
316
|
@namespace.setter
|
318
|
-
def namespace(self, value: Optional[pulumi.Input[
|
317
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
319
318
|
pulumi.set(self, "namespace", value)
|
320
319
|
|
321
|
-
@property
|
320
|
+
@_builtins.property
|
322
321
|
@pulumi.getter
|
323
|
-
def type(self) -> Optional[pulumi.Input[
|
322
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
324
323
|
"""
|
325
324
|
Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
326
325
|
"""
|
327
326
|
return pulumi.get(self, "type")
|
328
327
|
|
329
328
|
@type.setter
|
330
|
-
def type(self, value: Optional[pulumi.Input[
|
329
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
331
330
|
pulumi.set(self, "type", value)
|
332
331
|
|
333
332
|
|
@@ -337,14 +336,14 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
337
336
|
def __init__(__self__,
|
338
337
|
resource_name: str,
|
339
338
|
opts: Optional[pulumi.ResourceOptions] = None,
|
340
|
-
backend: Optional[pulumi.Input[
|
341
|
-
key_bits: Optional[pulumi.Input[
|
342
|
-
key_name: Optional[pulumi.Input[
|
343
|
-
key_type: Optional[pulumi.Input[
|
344
|
-
managed_key_id: Optional[pulumi.Input[
|
345
|
-
managed_key_name: Optional[pulumi.Input[
|
346
|
-
namespace: Optional[pulumi.Input[
|
347
|
-
type: Optional[pulumi.Input[
|
339
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
341
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
343
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
344
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
346
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
348
347
|
__props__=None):
|
349
348
|
"""
|
350
349
|
Creates a key on a PKI Secret Backend for Vault.
|
@@ -359,21 +358,21 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
359
358
|
|
360
359
|
:param str resource_name: The name of the resource.
|
361
360
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
362
|
-
:param pulumi.Input[
|
363
|
-
:param pulumi.Input[
|
361
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
362
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the number of bits to use for the generated keys.
|
364
363
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
365
364
|
2048 (default), 3072, or 4096; with `key_type=ec`, allowed values are: 224, 256 (default),
|
366
365
|
384, or 521; ignored with `key_type=ed25519`.
|
367
|
-
:param pulumi.Input[
|
366
|
+
:param pulumi.Input[_builtins.str] key_name: When a new key is created with this request, optionally specifies the name for this.
|
368
367
|
The global ref `default` may not be used as a name.
|
369
|
-
:param pulumi.Input[
|
370
|
-
:param pulumi.Input[
|
371
|
-
:param pulumi.Input[
|
372
|
-
:param pulumi.Input[
|
368
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
369
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The managed key's UUID.
|
370
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The managed key's configured name.
|
371
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
373
372
|
The value should not contain leading or trailing forward slashes.
|
374
373
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
375
374
|
*Available only for Vault Enterprise*.
|
376
|
-
:param pulumi.Input[
|
375
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
377
376
|
"""
|
378
377
|
...
|
379
378
|
@overload
|
@@ -407,14 +406,14 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
407
406
|
def _internal_init(__self__,
|
408
407
|
resource_name: str,
|
409
408
|
opts: Optional[pulumi.ResourceOptions] = None,
|
410
|
-
backend: Optional[pulumi.Input[
|
411
|
-
key_bits: Optional[pulumi.Input[
|
412
|
-
key_name: Optional[pulumi.Input[
|
413
|
-
key_type: Optional[pulumi.Input[
|
414
|
-
managed_key_id: Optional[pulumi.Input[
|
415
|
-
managed_key_name: Optional[pulumi.Input[
|
416
|
-
namespace: Optional[pulumi.Input[
|
417
|
-
type: Optional[pulumi.Input[
|
409
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
411
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
412
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
413
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
416
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
418
417
|
__props__=None):
|
419
418
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
420
419
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -447,15 +446,15 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
447
446
|
def get(resource_name: str,
|
448
447
|
id: pulumi.Input[str],
|
449
448
|
opts: Optional[pulumi.ResourceOptions] = None,
|
450
|
-
backend: Optional[pulumi.Input[
|
451
|
-
key_bits: Optional[pulumi.Input[
|
452
|
-
key_id: Optional[pulumi.Input[
|
453
|
-
key_name: Optional[pulumi.Input[
|
454
|
-
key_type: Optional[pulumi.Input[
|
455
|
-
managed_key_id: Optional[pulumi.Input[
|
456
|
-
managed_key_name: Optional[pulumi.Input[
|
457
|
-
namespace: Optional[pulumi.Input[
|
458
|
-
type: Optional[pulumi.Input[
|
449
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
451
|
+
key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
452
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
453
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
454
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
455
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
456
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendKey':
|
459
458
|
"""
|
460
459
|
Get an existing SecretBackendKey resource's state with the given name, id, and optional extra
|
461
460
|
properties used to qualify the lookup.
|
@@ -463,22 +462,22 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
463
462
|
:param str resource_name: The unique name of the resulting resource.
|
464
463
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
465
464
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
466
|
-
:param pulumi.Input[
|
467
|
-
:param pulumi.Input[
|
465
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
466
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the number of bits to use for the generated keys.
|
468
467
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
469
468
|
2048 (default), 3072, or 4096; with `key_type=ec`, allowed values are: 224, 256 (default),
|
470
469
|
384, or 521; ignored with `key_type=ed25519`.
|
471
|
-
:param pulumi.Input[
|
472
|
-
:param pulumi.Input[
|
470
|
+
:param pulumi.Input[_builtins.str] key_id: ID of the generated key.
|
471
|
+
:param pulumi.Input[_builtins.str] key_name: When a new key is created with this request, optionally specifies the name for this.
|
473
472
|
The global ref `default` may not be used as a name.
|
474
|
-
:param pulumi.Input[
|
475
|
-
:param pulumi.Input[
|
476
|
-
:param pulumi.Input[
|
477
|
-
:param pulumi.Input[
|
473
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
474
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The managed key's UUID.
|
475
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The managed key's configured name.
|
476
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
478
477
|
The value should not contain leading or trailing forward slashes.
|
479
478
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
480
479
|
*Available only for Vault Enterprise*.
|
481
|
-
:param pulumi.Input[
|
480
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
482
481
|
"""
|
483
482
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
484
483
|
|
@@ -495,17 +494,17 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
495
494
|
__props__.__dict__["type"] = type
|
496
495
|
return SecretBackendKey(resource_name, opts=opts, __props__=__props__)
|
497
496
|
|
498
|
-
@property
|
497
|
+
@_builtins.property
|
499
498
|
@pulumi.getter
|
500
|
-
def backend(self) -> pulumi.Output[
|
499
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
501
500
|
"""
|
502
501
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
503
502
|
"""
|
504
503
|
return pulumi.get(self, "backend")
|
505
504
|
|
506
|
-
@property
|
505
|
+
@_builtins.property
|
507
506
|
@pulumi.getter(name="keyBits")
|
508
|
-
def key_bits(self) -> pulumi.Output[
|
507
|
+
def key_bits(self) -> pulumi.Output[_builtins.int]:
|
509
508
|
"""
|
510
509
|
Specifies the number of bits to use for the generated keys.
|
511
510
|
Allowed values are 0 (universal default); with `key_type=rsa`, allowed values are:
|
@@ -514,50 +513,50 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
514
513
|
"""
|
515
514
|
return pulumi.get(self, "key_bits")
|
516
515
|
|
517
|
-
@property
|
516
|
+
@_builtins.property
|
518
517
|
@pulumi.getter(name="keyId")
|
519
|
-
def key_id(self) -> pulumi.Output[
|
518
|
+
def key_id(self) -> pulumi.Output[_builtins.str]:
|
520
519
|
"""
|
521
520
|
ID of the generated key.
|
522
521
|
"""
|
523
522
|
return pulumi.get(self, "key_id")
|
524
523
|
|
525
|
-
@property
|
524
|
+
@_builtins.property
|
526
525
|
@pulumi.getter(name="keyName")
|
527
|
-
def key_name(self) -> pulumi.Output[Optional[
|
526
|
+
def key_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
528
527
|
"""
|
529
528
|
When a new key is created with this request, optionally specifies the name for this.
|
530
529
|
The global ref `default` may not be used as a name.
|
531
530
|
"""
|
532
531
|
return pulumi.get(self, "key_name")
|
533
532
|
|
534
|
-
@property
|
533
|
+
@_builtins.property
|
535
534
|
@pulumi.getter(name="keyType")
|
536
|
-
def key_type(self) -> pulumi.Output[
|
535
|
+
def key_type(self) -> pulumi.Output[_builtins.str]:
|
537
536
|
"""
|
538
537
|
Specifies the desired key type; must be `rsa`, `ed25519` or `ec`.
|
539
538
|
"""
|
540
539
|
return pulumi.get(self, "key_type")
|
541
540
|
|
542
|
-
@property
|
541
|
+
@_builtins.property
|
543
542
|
@pulumi.getter(name="managedKeyId")
|
544
|
-
def managed_key_id(self) -> pulumi.Output[Optional[
|
543
|
+
def managed_key_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
545
544
|
"""
|
546
545
|
The managed key's UUID.
|
547
546
|
"""
|
548
547
|
return pulumi.get(self, "managed_key_id")
|
549
548
|
|
550
|
-
@property
|
549
|
+
@_builtins.property
|
551
550
|
@pulumi.getter(name="managedKeyName")
|
552
|
-
def managed_key_name(self) -> pulumi.Output[Optional[
|
551
|
+
def managed_key_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
553
552
|
"""
|
554
553
|
The managed key's configured name.
|
555
554
|
"""
|
556
555
|
return pulumi.get(self, "managed_key_name")
|
557
556
|
|
558
|
-
@property
|
557
|
+
@_builtins.property
|
559
558
|
@pulumi.getter
|
560
|
-
def namespace(self) -> pulumi.Output[Optional[
|
559
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
561
560
|
"""
|
562
561
|
The namespace to provision the resource in.
|
563
562
|
The value should not contain leading or trailing forward slashes.
|
@@ -566,9 +565,9 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
566
565
|
"""
|
567
566
|
return pulumi.get(self, "namespace")
|
568
567
|
|
569
|
-
@property
|
568
|
+
@_builtins.property
|
570
569
|
@pulumi.getter
|
571
|
-
def type(self) -> pulumi.Output[
|
570
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
572
571
|
"""
|
573
572
|
Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
574
573
|
"""
|