pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,944 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'KeysAwArgs',
19
+ 'KeysAwArgsDict',
20
+ 'KeysAzureArgs',
21
+ 'KeysAzureArgsDict',
22
+ 'KeysPkcArgs',
23
+ 'KeysPkcArgsDict',
24
+ ]
25
+
26
+ MYPY = False
27
+
28
+ if not MYPY:
29
+ class KeysAwArgsDict(TypedDict):
30
+ access_key: pulumi.Input[_builtins.str]
31
+ """
32
+ The AWS access key to use
33
+ """
34
+ key_bits: pulumi.Input[_builtins.str]
35
+ """
36
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
37
+ """
38
+ key_type: pulumi.Input[_builtins.str]
39
+ """
40
+ The type of key to use
41
+ """
42
+ kms_key: pulumi.Input[_builtins.str]
43
+ """
44
+ An identifier for the key
45
+ """
46
+ name: pulumi.Input[_builtins.str]
47
+ """
48
+ A unique lowercase name that serves as identifying the key
49
+ """
50
+ secret_key: pulumi.Input[_builtins.str]
51
+ """
52
+ The AWS secret key to use
53
+ """
54
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
55
+ """
56
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
57
+ """
58
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
59
+ """
60
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
61
+ """
62
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
63
+ """
64
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
65
+ """
66
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
67
+ """
68
+ Allow usage from any mount point within the namespace if 'true'
69
+ """
70
+ curve: NotRequired[pulumi.Input[_builtins.str]]
71
+ """
72
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
73
+ """
74
+ endpoint: NotRequired[pulumi.Input[_builtins.str]]
75
+ """
76
+ Used to specify a custom AWS endpoint
77
+ """
78
+ region: NotRequired[pulumi.Input[_builtins.str]]
79
+ """
80
+ The AWS region where the keys are stored (or will be stored)
81
+ """
82
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
83
+ """
84
+ ID of the managed key read from Vault
85
+ """
86
+ elif False:
87
+ KeysAwArgsDict: TypeAlias = Mapping[str, Any]
88
+
89
+ @pulumi.input_type
90
+ class KeysAwArgs:
91
+ def __init__(__self__, *,
92
+ access_key: pulumi.Input[_builtins.str],
93
+ key_bits: pulumi.Input[_builtins.str],
94
+ key_type: pulumi.Input[_builtins.str],
95
+ kms_key: pulumi.Input[_builtins.str],
96
+ name: pulumi.Input[_builtins.str],
97
+ secret_key: pulumi.Input[_builtins.str],
98
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
99
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
100
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
101
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
102
+ curve: Optional[pulumi.Input[_builtins.str]] = None,
103
+ endpoint: Optional[pulumi.Input[_builtins.str]] = None,
104
+ region: Optional[pulumi.Input[_builtins.str]] = None,
105
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
106
+ """
107
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key to use
108
+ :param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
109
+ :param pulumi.Input[_builtins.str] key_type: The type of key to use
110
+ :param pulumi.Input[_builtins.str] kms_key: An identifier for the key
111
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
112
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key to use
113
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
114
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
115
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
116
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
117
+ :param pulumi.Input[_builtins.str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
118
+ :param pulumi.Input[_builtins.str] endpoint: Used to specify a custom AWS endpoint
119
+ :param pulumi.Input[_builtins.str] region: The AWS region where the keys are stored (or will be stored)
120
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
121
+ """
122
+ pulumi.set(__self__, "access_key", access_key)
123
+ pulumi.set(__self__, "key_bits", key_bits)
124
+ pulumi.set(__self__, "key_type", key_type)
125
+ pulumi.set(__self__, "kms_key", kms_key)
126
+ pulumi.set(__self__, "name", name)
127
+ pulumi.set(__self__, "secret_key", secret_key)
128
+ if allow_generate_key is not None:
129
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
130
+ if allow_replace_key is not None:
131
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
132
+ if allow_store_key is not None:
133
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
134
+ if any_mount is not None:
135
+ pulumi.set(__self__, "any_mount", any_mount)
136
+ if curve is not None:
137
+ pulumi.set(__self__, "curve", curve)
138
+ if endpoint is not None:
139
+ pulumi.set(__self__, "endpoint", endpoint)
140
+ if region is not None:
141
+ pulumi.set(__self__, "region", region)
142
+ if uuid is not None:
143
+ pulumi.set(__self__, "uuid", uuid)
144
+
145
+ @_builtins.property
146
+ @pulumi.getter(name="accessKey")
147
+ def access_key(self) -> pulumi.Input[_builtins.str]:
148
+ """
149
+ The AWS access key to use
150
+ """
151
+ return pulumi.get(self, "access_key")
152
+
153
+ @access_key.setter
154
+ def access_key(self, value: pulumi.Input[_builtins.str]):
155
+ pulumi.set(self, "access_key", value)
156
+
157
+ @_builtins.property
158
+ @pulumi.getter(name="keyBits")
159
+ def key_bits(self) -> pulumi.Input[_builtins.str]:
160
+ """
161
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
162
+ """
163
+ return pulumi.get(self, "key_bits")
164
+
165
+ @key_bits.setter
166
+ def key_bits(self, value: pulumi.Input[_builtins.str]):
167
+ pulumi.set(self, "key_bits", value)
168
+
169
+ @_builtins.property
170
+ @pulumi.getter(name="keyType")
171
+ def key_type(self) -> pulumi.Input[_builtins.str]:
172
+ """
173
+ The type of key to use
174
+ """
175
+ return pulumi.get(self, "key_type")
176
+
177
+ @key_type.setter
178
+ def key_type(self, value: pulumi.Input[_builtins.str]):
179
+ pulumi.set(self, "key_type", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="kmsKey")
183
+ def kms_key(self) -> pulumi.Input[_builtins.str]:
184
+ """
185
+ An identifier for the key
186
+ """
187
+ return pulumi.get(self, "kms_key")
188
+
189
+ @kms_key.setter
190
+ def kms_key(self, value: pulumi.Input[_builtins.str]):
191
+ pulumi.set(self, "kms_key", value)
192
+
193
+ @_builtins.property
194
+ @pulumi.getter
195
+ def name(self) -> pulumi.Input[_builtins.str]:
196
+ """
197
+ A unique lowercase name that serves as identifying the key
198
+ """
199
+ return pulumi.get(self, "name")
200
+
201
+ @name.setter
202
+ def name(self, value: pulumi.Input[_builtins.str]):
203
+ pulumi.set(self, "name", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="secretKey")
207
+ def secret_key(self) -> pulumi.Input[_builtins.str]:
208
+ """
209
+ The AWS secret key to use
210
+ """
211
+ return pulumi.get(self, "secret_key")
212
+
213
+ @secret_key.setter
214
+ def secret_key(self, value: pulumi.Input[_builtins.str]):
215
+ pulumi.set(self, "secret_key", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="allowGenerateKey")
219
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
220
+ """
221
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
222
+ """
223
+ return pulumi.get(self, "allow_generate_key")
224
+
225
+ @allow_generate_key.setter
226
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
227
+ pulumi.set(self, "allow_generate_key", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="allowReplaceKey")
231
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
232
+ """
233
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
234
+ """
235
+ return pulumi.get(self, "allow_replace_key")
236
+
237
+ @allow_replace_key.setter
238
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
239
+ pulumi.set(self, "allow_replace_key", value)
240
+
241
+ @_builtins.property
242
+ @pulumi.getter(name="allowStoreKey")
243
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
244
+ """
245
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
246
+ """
247
+ return pulumi.get(self, "allow_store_key")
248
+
249
+ @allow_store_key.setter
250
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
251
+ pulumi.set(self, "allow_store_key", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter(name="anyMount")
255
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
256
+ """
257
+ Allow usage from any mount point within the namespace if 'true'
258
+ """
259
+ return pulumi.get(self, "any_mount")
260
+
261
+ @any_mount.setter
262
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
263
+ pulumi.set(self, "any_mount", value)
264
+
265
+ @_builtins.property
266
+ @pulumi.getter
267
+ def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
268
+ """
269
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
270
+ """
271
+ return pulumi.get(self, "curve")
272
+
273
+ @curve.setter
274
+ def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
275
+ pulumi.set(self, "curve", value)
276
+
277
+ @_builtins.property
278
+ @pulumi.getter
279
+ def endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
280
+ """
281
+ Used to specify a custom AWS endpoint
282
+ """
283
+ return pulumi.get(self, "endpoint")
284
+
285
+ @endpoint.setter
286
+ def endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
287
+ pulumi.set(self, "endpoint", value)
288
+
289
+ @_builtins.property
290
+ @pulumi.getter
291
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
292
+ """
293
+ The AWS region where the keys are stored (or will be stored)
294
+ """
295
+ return pulumi.get(self, "region")
296
+
297
+ @region.setter
298
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
299
+ pulumi.set(self, "region", value)
300
+
301
+ @_builtins.property
302
+ @pulumi.getter
303
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
304
+ """
305
+ ID of the managed key read from Vault
306
+ """
307
+ return pulumi.get(self, "uuid")
308
+
309
+ @uuid.setter
310
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
311
+ pulumi.set(self, "uuid", value)
312
+
313
+
314
+ if not MYPY:
315
+ class KeysAzureArgsDict(TypedDict):
316
+ client_id: pulumi.Input[_builtins.str]
317
+ """
318
+ The client id for credentials to query the Azure APIs
319
+ """
320
+ client_secret: pulumi.Input[_builtins.str]
321
+ """
322
+ The client secret for credentials to query the Azure APIs
323
+ """
324
+ key_name: pulumi.Input[_builtins.str]
325
+ """
326
+ The Key Vault key to use for encryption and decryption
327
+ """
328
+ key_type: pulumi.Input[_builtins.str]
329
+ """
330
+ The type of key to use
331
+ """
332
+ name: pulumi.Input[_builtins.str]
333
+ """
334
+ A unique lowercase name that serves as identifying the key
335
+ """
336
+ tenant_id: pulumi.Input[_builtins.str]
337
+ """
338
+ The tenant id for the Azure Active Directory organization
339
+ """
340
+ vault_name: pulumi.Input[_builtins.str]
341
+ """
342
+ The Key Vault vault to use the encryption keys for encryption and decryption
343
+ """
344
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
345
+ """
346
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
347
+ """
348
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
349
+ """
350
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
351
+ """
352
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
353
+ """
354
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
355
+ """
356
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
357
+ """
358
+ Allow usage from any mount point within the namespace if 'true'
359
+ """
360
+ environment: NotRequired[pulumi.Input[_builtins.str]]
361
+ """
362
+ The Azure Cloud environment API endpoints to use
363
+ """
364
+ key_bits: NotRequired[pulumi.Input[_builtins.str]]
365
+ """
366
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
367
+ """
368
+ resource: NotRequired[pulumi.Input[_builtins.str]]
369
+ """
370
+ The Azure Key Vault resource's DNS Suffix to connect to
371
+ """
372
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
373
+ """
374
+ ID of the managed key read from Vault
375
+ """
376
+ elif False:
377
+ KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
378
+
379
+ @pulumi.input_type
380
+ class KeysAzureArgs:
381
+ def __init__(__self__, *,
382
+ client_id: pulumi.Input[_builtins.str],
383
+ client_secret: pulumi.Input[_builtins.str],
384
+ key_name: pulumi.Input[_builtins.str],
385
+ key_type: pulumi.Input[_builtins.str],
386
+ name: pulumi.Input[_builtins.str],
387
+ tenant_id: pulumi.Input[_builtins.str],
388
+ vault_name: pulumi.Input[_builtins.str],
389
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
390
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
391
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
392
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
393
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
394
+ key_bits: Optional[pulumi.Input[_builtins.str]] = None,
395
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
396
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
397
+ """
398
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs
399
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the Azure APIs
400
+ :param pulumi.Input[_builtins.str] key_name: The Key Vault key to use for encryption and decryption
401
+ :param pulumi.Input[_builtins.str] key_type: The type of key to use
402
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
403
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory organization
404
+ :param pulumi.Input[_builtins.str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
405
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
406
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
407
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
408
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
409
+ :param pulumi.Input[_builtins.str] environment: The Azure Cloud environment API endpoints to use
410
+ :param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
411
+ :param pulumi.Input[_builtins.str] resource: The Azure Key Vault resource's DNS Suffix to connect to
412
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
413
+ """
414
+ pulumi.set(__self__, "client_id", client_id)
415
+ pulumi.set(__self__, "client_secret", client_secret)
416
+ pulumi.set(__self__, "key_name", key_name)
417
+ pulumi.set(__self__, "key_type", key_type)
418
+ pulumi.set(__self__, "name", name)
419
+ pulumi.set(__self__, "tenant_id", tenant_id)
420
+ pulumi.set(__self__, "vault_name", vault_name)
421
+ if allow_generate_key is not None:
422
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
423
+ if allow_replace_key is not None:
424
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
425
+ if allow_store_key is not None:
426
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
427
+ if any_mount is not None:
428
+ pulumi.set(__self__, "any_mount", any_mount)
429
+ if environment is not None:
430
+ pulumi.set(__self__, "environment", environment)
431
+ if key_bits is not None:
432
+ pulumi.set(__self__, "key_bits", key_bits)
433
+ if resource is not None:
434
+ pulumi.set(__self__, "resource", resource)
435
+ if uuid is not None:
436
+ pulumi.set(__self__, "uuid", uuid)
437
+
438
+ @_builtins.property
439
+ @pulumi.getter(name="clientId")
440
+ def client_id(self) -> pulumi.Input[_builtins.str]:
441
+ """
442
+ The client id for credentials to query the Azure APIs
443
+ """
444
+ return pulumi.get(self, "client_id")
445
+
446
+ @client_id.setter
447
+ def client_id(self, value: pulumi.Input[_builtins.str]):
448
+ pulumi.set(self, "client_id", value)
449
+
450
+ @_builtins.property
451
+ @pulumi.getter(name="clientSecret")
452
+ def client_secret(self) -> pulumi.Input[_builtins.str]:
453
+ """
454
+ The client secret for credentials to query the Azure APIs
455
+ """
456
+ return pulumi.get(self, "client_secret")
457
+
458
+ @client_secret.setter
459
+ def client_secret(self, value: pulumi.Input[_builtins.str]):
460
+ pulumi.set(self, "client_secret", value)
461
+
462
+ @_builtins.property
463
+ @pulumi.getter(name="keyName")
464
+ def key_name(self) -> pulumi.Input[_builtins.str]:
465
+ """
466
+ The Key Vault key to use for encryption and decryption
467
+ """
468
+ return pulumi.get(self, "key_name")
469
+
470
+ @key_name.setter
471
+ def key_name(self, value: pulumi.Input[_builtins.str]):
472
+ pulumi.set(self, "key_name", value)
473
+
474
+ @_builtins.property
475
+ @pulumi.getter(name="keyType")
476
+ def key_type(self) -> pulumi.Input[_builtins.str]:
477
+ """
478
+ The type of key to use
479
+ """
480
+ return pulumi.get(self, "key_type")
481
+
482
+ @key_type.setter
483
+ def key_type(self, value: pulumi.Input[_builtins.str]):
484
+ pulumi.set(self, "key_type", value)
485
+
486
+ @_builtins.property
487
+ @pulumi.getter
488
+ def name(self) -> pulumi.Input[_builtins.str]:
489
+ """
490
+ A unique lowercase name that serves as identifying the key
491
+ """
492
+ return pulumi.get(self, "name")
493
+
494
+ @name.setter
495
+ def name(self, value: pulumi.Input[_builtins.str]):
496
+ pulumi.set(self, "name", value)
497
+
498
+ @_builtins.property
499
+ @pulumi.getter(name="tenantId")
500
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
501
+ """
502
+ The tenant id for the Azure Active Directory organization
503
+ """
504
+ return pulumi.get(self, "tenant_id")
505
+
506
+ @tenant_id.setter
507
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
508
+ pulumi.set(self, "tenant_id", value)
509
+
510
+ @_builtins.property
511
+ @pulumi.getter(name="vaultName")
512
+ def vault_name(self) -> pulumi.Input[_builtins.str]:
513
+ """
514
+ The Key Vault vault to use the encryption keys for encryption and decryption
515
+ """
516
+ return pulumi.get(self, "vault_name")
517
+
518
+ @vault_name.setter
519
+ def vault_name(self, value: pulumi.Input[_builtins.str]):
520
+ pulumi.set(self, "vault_name", value)
521
+
522
+ @_builtins.property
523
+ @pulumi.getter(name="allowGenerateKey")
524
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
525
+ """
526
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
527
+ """
528
+ return pulumi.get(self, "allow_generate_key")
529
+
530
+ @allow_generate_key.setter
531
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
532
+ pulumi.set(self, "allow_generate_key", value)
533
+
534
+ @_builtins.property
535
+ @pulumi.getter(name="allowReplaceKey")
536
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
537
+ """
538
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
539
+ """
540
+ return pulumi.get(self, "allow_replace_key")
541
+
542
+ @allow_replace_key.setter
543
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
544
+ pulumi.set(self, "allow_replace_key", value)
545
+
546
+ @_builtins.property
547
+ @pulumi.getter(name="allowStoreKey")
548
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
549
+ """
550
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
551
+ """
552
+ return pulumi.get(self, "allow_store_key")
553
+
554
+ @allow_store_key.setter
555
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
556
+ pulumi.set(self, "allow_store_key", value)
557
+
558
+ @_builtins.property
559
+ @pulumi.getter(name="anyMount")
560
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
561
+ """
562
+ Allow usage from any mount point within the namespace if 'true'
563
+ """
564
+ return pulumi.get(self, "any_mount")
565
+
566
+ @any_mount.setter
567
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
568
+ pulumi.set(self, "any_mount", value)
569
+
570
+ @_builtins.property
571
+ @pulumi.getter
572
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
573
+ """
574
+ The Azure Cloud environment API endpoints to use
575
+ """
576
+ return pulumi.get(self, "environment")
577
+
578
+ @environment.setter
579
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
580
+ pulumi.set(self, "environment", value)
581
+
582
+ @_builtins.property
583
+ @pulumi.getter(name="keyBits")
584
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
585
+ """
586
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
587
+ """
588
+ return pulumi.get(self, "key_bits")
589
+
590
+ @key_bits.setter
591
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
592
+ pulumi.set(self, "key_bits", value)
593
+
594
+ @_builtins.property
595
+ @pulumi.getter
596
+ def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
597
+ """
598
+ The Azure Key Vault resource's DNS Suffix to connect to
599
+ """
600
+ return pulumi.get(self, "resource")
601
+
602
+ @resource.setter
603
+ def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
604
+ pulumi.set(self, "resource", value)
605
+
606
+ @_builtins.property
607
+ @pulumi.getter
608
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
609
+ """
610
+ ID of the managed key read from Vault
611
+ """
612
+ return pulumi.get(self, "uuid")
613
+
614
+ @uuid.setter
615
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
616
+ pulumi.set(self, "uuid", value)
617
+
618
+
619
+ if not MYPY:
620
+ class KeysPkcArgsDict(TypedDict):
621
+ key_id: pulumi.Input[_builtins.str]
622
+ """
623
+ The id of a PKCS#11 key to use
624
+ """
625
+ key_label: pulumi.Input[_builtins.str]
626
+ """
627
+ The label of the key to use
628
+ """
629
+ library: pulumi.Input[_builtins.str]
630
+ """
631
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
632
+ """
633
+ mechanism: pulumi.Input[_builtins.str]
634
+ """
635
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
636
+ """
637
+ name: pulumi.Input[_builtins.str]
638
+ """
639
+ A unique lowercase name that serves as identifying the key
640
+ """
641
+ pin: pulumi.Input[_builtins.str]
642
+ """
643
+ The PIN for login
644
+ """
645
+ allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
646
+ """
647
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
648
+ """
649
+ allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
650
+ """
651
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
652
+ """
653
+ allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
654
+ """
655
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
656
+ """
657
+ any_mount: NotRequired[pulumi.Input[_builtins.bool]]
658
+ """
659
+ Allow usage from any mount point within the namespace if 'true'
660
+ """
661
+ curve: NotRequired[pulumi.Input[_builtins.str]]
662
+ """
663
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
664
+ """
665
+ force_rw_session: NotRequired[pulumi.Input[_builtins.str]]
666
+ """
667
+ Force all operations to open up a read-write session to the HSM
668
+ """
669
+ key_bits: NotRequired[pulumi.Input[_builtins.str]]
670
+ """
671
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
672
+ """
673
+ slot: NotRequired[pulumi.Input[_builtins.str]]
674
+ """
675
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
676
+ """
677
+ token_label: NotRequired[pulumi.Input[_builtins.str]]
678
+ """
679
+ The slot token label to use
680
+ """
681
+ uuid: NotRequired[pulumi.Input[_builtins.str]]
682
+ """
683
+ ID of the managed key read from Vault
684
+ """
685
+ elif False:
686
+ KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
687
+
688
+ @pulumi.input_type
689
+ class KeysPkcArgs:
690
+ def __init__(__self__, *,
691
+ key_id: pulumi.Input[_builtins.str],
692
+ key_label: pulumi.Input[_builtins.str],
693
+ library: pulumi.Input[_builtins.str],
694
+ mechanism: pulumi.Input[_builtins.str],
695
+ name: pulumi.Input[_builtins.str],
696
+ pin: pulumi.Input[_builtins.str],
697
+ allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
698
+ allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
699
+ allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
700
+ any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
701
+ curve: Optional[pulumi.Input[_builtins.str]] = None,
702
+ force_rw_session: Optional[pulumi.Input[_builtins.str]] = None,
703
+ key_bits: Optional[pulumi.Input[_builtins.str]] = None,
704
+ slot: Optional[pulumi.Input[_builtins.str]] = None,
705
+ token_label: Optional[pulumi.Input[_builtins.str]] = None,
706
+ uuid: Optional[pulumi.Input[_builtins.str]] = None):
707
+ """
708
+ :param pulumi.Input[_builtins.str] key_id: The id of a PKCS#11 key to use
709
+ :param pulumi.Input[_builtins.str] key_label: The label of the key to use
710
+ :param pulumi.Input[_builtins.str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
711
+ :param pulumi.Input[_builtins.str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
712
+ :param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
713
+ :param pulumi.Input[_builtins.str] pin: The PIN for login
714
+ :param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
715
+ :param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
716
+ :param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
717
+ :param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
718
+ :param pulumi.Input[_builtins.str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
719
+ :param pulumi.Input[_builtins.str] force_rw_session: Force all operations to open up a read-write session to the HSM
720
+ :param pulumi.Input[_builtins.str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
721
+ :param pulumi.Input[_builtins.str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
722
+ :param pulumi.Input[_builtins.str] token_label: The slot token label to use
723
+ :param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
724
+ """
725
+ pulumi.set(__self__, "key_id", key_id)
726
+ pulumi.set(__self__, "key_label", key_label)
727
+ pulumi.set(__self__, "library", library)
728
+ pulumi.set(__self__, "mechanism", mechanism)
729
+ pulumi.set(__self__, "name", name)
730
+ pulumi.set(__self__, "pin", pin)
731
+ if allow_generate_key is not None:
732
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
733
+ if allow_replace_key is not None:
734
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
735
+ if allow_store_key is not None:
736
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
737
+ if any_mount is not None:
738
+ pulumi.set(__self__, "any_mount", any_mount)
739
+ if curve is not None:
740
+ pulumi.set(__self__, "curve", curve)
741
+ if force_rw_session is not None:
742
+ pulumi.set(__self__, "force_rw_session", force_rw_session)
743
+ if key_bits is not None:
744
+ pulumi.set(__self__, "key_bits", key_bits)
745
+ if slot is not None:
746
+ pulumi.set(__self__, "slot", slot)
747
+ if token_label is not None:
748
+ pulumi.set(__self__, "token_label", token_label)
749
+ if uuid is not None:
750
+ pulumi.set(__self__, "uuid", uuid)
751
+
752
+ @_builtins.property
753
+ @pulumi.getter(name="keyId")
754
+ def key_id(self) -> pulumi.Input[_builtins.str]:
755
+ """
756
+ The id of a PKCS#11 key to use
757
+ """
758
+ return pulumi.get(self, "key_id")
759
+
760
+ @key_id.setter
761
+ def key_id(self, value: pulumi.Input[_builtins.str]):
762
+ pulumi.set(self, "key_id", value)
763
+
764
+ @_builtins.property
765
+ @pulumi.getter(name="keyLabel")
766
+ def key_label(self) -> pulumi.Input[_builtins.str]:
767
+ """
768
+ The label of the key to use
769
+ """
770
+ return pulumi.get(self, "key_label")
771
+
772
+ @key_label.setter
773
+ def key_label(self, value: pulumi.Input[_builtins.str]):
774
+ pulumi.set(self, "key_label", value)
775
+
776
+ @_builtins.property
777
+ @pulumi.getter
778
+ def library(self) -> pulumi.Input[_builtins.str]:
779
+ """
780
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
781
+ """
782
+ return pulumi.get(self, "library")
783
+
784
+ @library.setter
785
+ def library(self, value: pulumi.Input[_builtins.str]):
786
+ pulumi.set(self, "library", value)
787
+
788
+ @_builtins.property
789
+ @pulumi.getter
790
+ def mechanism(self) -> pulumi.Input[_builtins.str]:
791
+ """
792
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
793
+ """
794
+ return pulumi.get(self, "mechanism")
795
+
796
+ @mechanism.setter
797
+ def mechanism(self, value: pulumi.Input[_builtins.str]):
798
+ pulumi.set(self, "mechanism", value)
799
+
800
+ @_builtins.property
801
+ @pulumi.getter
802
+ def name(self) -> pulumi.Input[_builtins.str]:
803
+ """
804
+ A unique lowercase name that serves as identifying the key
805
+ """
806
+ return pulumi.get(self, "name")
807
+
808
+ @name.setter
809
+ def name(self, value: pulumi.Input[_builtins.str]):
810
+ pulumi.set(self, "name", value)
811
+
812
+ @_builtins.property
813
+ @pulumi.getter
814
+ def pin(self) -> pulumi.Input[_builtins.str]:
815
+ """
816
+ The PIN for login
817
+ """
818
+ return pulumi.get(self, "pin")
819
+
820
+ @pin.setter
821
+ def pin(self, value: pulumi.Input[_builtins.str]):
822
+ pulumi.set(self, "pin", value)
823
+
824
+ @_builtins.property
825
+ @pulumi.getter(name="allowGenerateKey")
826
+ def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
827
+ """
828
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
829
+ """
830
+ return pulumi.get(self, "allow_generate_key")
831
+
832
+ @allow_generate_key.setter
833
+ def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
834
+ pulumi.set(self, "allow_generate_key", value)
835
+
836
+ @_builtins.property
837
+ @pulumi.getter(name="allowReplaceKey")
838
+ def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
839
+ """
840
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
841
+ """
842
+ return pulumi.get(self, "allow_replace_key")
843
+
844
+ @allow_replace_key.setter
845
+ def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
846
+ pulumi.set(self, "allow_replace_key", value)
847
+
848
+ @_builtins.property
849
+ @pulumi.getter(name="allowStoreKey")
850
+ def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
851
+ """
852
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
853
+ """
854
+ return pulumi.get(self, "allow_store_key")
855
+
856
+ @allow_store_key.setter
857
+ def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
858
+ pulumi.set(self, "allow_store_key", value)
859
+
860
+ @_builtins.property
861
+ @pulumi.getter(name="anyMount")
862
+ def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
863
+ """
864
+ Allow usage from any mount point within the namespace if 'true'
865
+ """
866
+ return pulumi.get(self, "any_mount")
867
+
868
+ @any_mount.setter
869
+ def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
870
+ pulumi.set(self, "any_mount", value)
871
+
872
+ @_builtins.property
873
+ @pulumi.getter
874
+ def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
875
+ """
876
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
877
+ """
878
+ return pulumi.get(self, "curve")
879
+
880
+ @curve.setter
881
+ def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
882
+ pulumi.set(self, "curve", value)
883
+
884
+ @_builtins.property
885
+ @pulumi.getter(name="forceRwSession")
886
+ def force_rw_session(self) -> Optional[pulumi.Input[_builtins.str]]:
887
+ """
888
+ Force all operations to open up a read-write session to the HSM
889
+ """
890
+ return pulumi.get(self, "force_rw_session")
891
+
892
+ @force_rw_session.setter
893
+ def force_rw_session(self, value: Optional[pulumi.Input[_builtins.str]]):
894
+ pulumi.set(self, "force_rw_session", value)
895
+
896
+ @_builtins.property
897
+ @pulumi.getter(name="keyBits")
898
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
899
+ """
900
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
901
+ """
902
+ return pulumi.get(self, "key_bits")
903
+
904
+ @key_bits.setter
905
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
906
+ pulumi.set(self, "key_bits", value)
907
+
908
+ @_builtins.property
909
+ @pulumi.getter
910
+ def slot(self) -> Optional[pulumi.Input[_builtins.str]]:
911
+ """
912
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
913
+ """
914
+ return pulumi.get(self, "slot")
915
+
916
+ @slot.setter
917
+ def slot(self, value: Optional[pulumi.Input[_builtins.str]]):
918
+ pulumi.set(self, "slot", value)
919
+
920
+ @_builtins.property
921
+ @pulumi.getter(name="tokenLabel")
922
+ def token_label(self) -> Optional[pulumi.Input[_builtins.str]]:
923
+ """
924
+ The slot token label to use
925
+ """
926
+ return pulumi.get(self, "token_label")
927
+
928
+ @token_label.setter
929
+ def token_label(self, value: Optional[pulumi.Input[_builtins.str]]):
930
+ pulumi.set(self, "token_label", value)
931
+
932
+ @_builtins.property
933
+ @pulumi.getter
934
+ def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
935
+ """
936
+ ID of the managed key read from Vault
937
+ """
938
+ return pulumi.get(self, "uuid")
939
+
940
+ @uuid.setter
941
+ def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
942
+ pulumi.set(self, "uuid", value)
943
+
944
+