pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,944 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'KeysAwArgs',
|
|
19
|
+
'KeysAwArgsDict',
|
|
20
|
+
'KeysAzureArgs',
|
|
21
|
+
'KeysAzureArgsDict',
|
|
22
|
+
'KeysPkcArgs',
|
|
23
|
+
'KeysPkcArgsDict',
|
|
24
|
+
]
|
|
25
|
+
|
|
26
|
+
MYPY = False
|
|
27
|
+
|
|
28
|
+
if not MYPY:
|
|
29
|
+
class KeysAwArgsDict(TypedDict):
|
|
30
|
+
access_key: pulumi.Input[_builtins.str]
|
|
31
|
+
"""
|
|
32
|
+
The AWS access key to use
|
|
33
|
+
"""
|
|
34
|
+
key_bits: pulumi.Input[_builtins.str]
|
|
35
|
+
"""
|
|
36
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
|
37
|
+
"""
|
|
38
|
+
key_type: pulumi.Input[_builtins.str]
|
|
39
|
+
"""
|
|
40
|
+
The type of key to use
|
|
41
|
+
"""
|
|
42
|
+
kms_key: pulumi.Input[_builtins.str]
|
|
43
|
+
"""
|
|
44
|
+
An identifier for the key
|
|
45
|
+
"""
|
|
46
|
+
name: pulumi.Input[_builtins.str]
|
|
47
|
+
"""
|
|
48
|
+
A unique lowercase name that serves as identifying the key
|
|
49
|
+
"""
|
|
50
|
+
secret_key: pulumi.Input[_builtins.str]
|
|
51
|
+
"""
|
|
52
|
+
The AWS secret key to use
|
|
53
|
+
"""
|
|
54
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
55
|
+
"""
|
|
56
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
57
|
+
"""
|
|
58
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
59
|
+
"""
|
|
60
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
61
|
+
"""
|
|
62
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
63
|
+
"""
|
|
64
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
65
|
+
"""
|
|
66
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
|
67
|
+
"""
|
|
68
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
69
|
+
"""
|
|
70
|
+
curve: NotRequired[pulumi.Input[_builtins.str]]
|
|
71
|
+
"""
|
|
72
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
|
73
|
+
"""
|
|
74
|
+
endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
|
75
|
+
"""
|
|
76
|
+
Used to specify a custom AWS endpoint
|
|
77
|
+
"""
|
|
78
|
+
region: NotRequired[pulumi.Input[_builtins.str]]
|
|
79
|
+
"""
|
|
80
|
+
The AWS region where the keys are stored (or will be stored)
|
|
81
|
+
"""
|
|
82
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
|
83
|
+
"""
|
|
84
|
+
ID of the managed key read from Vault
|
|
85
|
+
"""
|
|
86
|
+
elif False:
|
|
87
|
+
KeysAwArgsDict: TypeAlias = Mapping[str, Any]
|
|
88
|
+
|
|
89
|
+
@pulumi.input_type
|
|
90
|
+
class KeysAwArgs:
|
|
91
|
+
def __init__(__self__, *,
|
|
92
|
+
access_key: pulumi.Input[_builtins.str],
|
|
93
|
+
key_bits: pulumi.Input[_builtins.str],
|
|
94
|
+
key_type: pulumi.Input[_builtins.str],
|
|
95
|
+
kms_key: pulumi.Input[_builtins.str],
|
|
96
|
+
name: pulumi.Input[_builtins.str],
|
|
97
|
+
secret_key: pulumi.Input[_builtins.str],
|
|
98
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
99
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
100
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
101
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
102
|
+
curve: Optional[pulumi.Input[_builtins.str]] = None,
|
|
103
|
+
endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
|
104
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
|
105
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
|
106
|
+
"""
|
|
107
|
+
:param pulumi.Input[_builtins.str] access_key: The AWS access key to use
|
|
108
|
+
:param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
|
109
|
+
:param pulumi.Input[_builtins.str] key_type: The type of key to use
|
|
110
|
+
:param pulumi.Input[_builtins.str] kms_key: An identifier for the key
|
|
111
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
|
112
|
+
:param pulumi.Input[_builtins.str] secret_key: The AWS secret key to use
|
|
113
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
114
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
115
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
116
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
117
|
+
:param pulumi.Input[_builtins.str] curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
|
118
|
+
:param pulumi.Input[_builtins.str] endpoint: Used to specify a custom AWS endpoint
|
|
119
|
+
:param pulumi.Input[_builtins.str] region: The AWS region where the keys are stored (or will be stored)
|
|
120
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
|
121
|
+
"""
|
|
122
|
+
pulumi.set(__self__, "access_key", access_key)
|
|
123
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
124
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
125
|
+
pulumi.set(__self__, "kms_key", kms_key)
|
|
126
|
+
pulumi.set(__self__, "name", name)
|
|
127
|
+
pulumi.set(__self__, "secret_key", secret_key)
|
|
128
|
+
if allow_generate_key is not None:
|
|
129
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
130
|
+
if allow_replace_key is not None:
|
|
131
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
132
|
+
if allow_store_key is not None:
|
|
133
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
134
|
+
if any_mount is not None:
|
|
135
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
136
|
+
if curve is not None:
|
|
137
|
+
pulumi.set(__self__, "curve", curve)
|
|
138
|
+
if endpoint is not None:
|
|
139
|
+
pulumi.set(__self__, "endpoint", endpoint)
|
|
140
|
+
if region is not None:
|
|
141
|
+
pulumi.set(__self__, "region", region)
|
|
142
|
+
if uuid is not None:
|
|
143
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
144
|
+
|
|
145
|
+
@_builtins.property
|
|
146
|
+
@pulumi.getter(name="accessKey")
|
|
147
|
+
def access_key(self) -> pulumi.Input[_builtins.str]:
|
|
148
|
+
"""
|
|
149
|
+
The AWS access key to use
|
|
150
|
+
"""
|
|
151
|
+
return pulumi.get(self, "access_key")
|
|
152
|
+
|
|
153
|
+
@access_key.setter
|
|
154
|
+
def access_key(self, value: pulumi.Input[_builtins.str]):
|
|
155
|
+
pulumi.set(self, "access_key", value)
|
|
156
|
+
|
|
157
|
+
@_builtins.property
|
|
158
|
+
@pulumi.getter(name="keyBits")
|
|
159
|
+
def key_bits(self) -> pulumi.Input[_builtins.str]:
|
|
160
|
+
"""
|
|
161
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
|
162
|
+
"""
|
|
163
|
+
return pulumi.get(self, "key_bits")
|
|
164
|
+
|
|
165
|
+
@key_bits.setter
|
|
166
|
+
def key_bits(self, value: pulumi.Input[_builtins.str]):
|
|
167
|
+
pulumi.set(self, "key_bits", value)
|
|
168
|
+
|
|
169
|
+
@_builtins.property
|
|
170
|
+
@pulumi.getter(name="keyType")
|
|
171
|
+
def key_type(self) -> pulumi.Input[_builtins.str]:
|
|
172
|
+
"""
|
|
173
|
+
The type of key to use
|
|
174
|
+
"""
|
|
175
|
+
return pulumi.get(self, "key_type")
|
|
176
|
+
|
|
177
|
+
@key_type.setter
|
|
178
|
+
def key_type(self, value: pulumi.Input[_builtins.str]):
|
|
179
|
+
pulumi.set(self, "key_type", value)
|
|
180
|
+
|
|
181
|
+
@_builtins.property
|
|
182
|
+
@pulumi.getter(name="kmsKey")
|
|
183
|
+
def kms_key(self) -> pulumi.Input[_builtins.str]:
|
|
184
|
+
"""
|
|
185
|
+
An identifier for the key
|
|
186
|
+
"""
|
|
187
|
+
return pulumi.get(self, "kms_key")
|
|
188
|
+
|
|
189
|
+
@kms_key.setter
|
|
190
|
+
def kms_key(self, value: pulumi.Input[_builtins.str]):
|
|
191
|
+
pulumi.set(self, "kms_key", value)
|
|
192
|
+
|
|
193
|
+
@_builtins.property
|
|
194
|
+
@pulumi.getter
|
|
195
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
|
196
|
+
"""
|
|
197
|
+
A unique lowercase name that serves as identifying the key
|
|
198
|
+
"""
|
|
199
|
+
return pulumi.get(self, "name")
|
|
200
|
+
|
|
201
|
+
@name.setter
|
|
202
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
|
203
|
+
pulumi.set(self, "name", value)
|
|
204
|
+
|
|
205
|
+
@_builtins.property
|
|
206
|
+
@pulumi.getter(name="secretKey")
|
|
207
|
+
def secret_key(self) -> pulumi.Input[_builtins.str]:
|
|
208
|
+
"""
|
|
209
|
+
The AWS secret key to use
|
|
210
|
+
"""
|
|
211
|
+
return pulumi.get(self, "secret_key")
|
|
212
|
+
|
|
213
|
+
@secret_key.setter
|
|
214
|
+
def secret_key(self, value: pulumi.Input[_builtins.str]):
|
|
215
|
+
pulumi.set(self, "secret_key", value)
|
|
216
|
+
|
|
217
|
+
@_builtins.property
|
|
218
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
219
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
220
|
+
"""
|
|
221
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
222
|
+
"""
|
|
223
|
+
return pulumi.get(self, "allow_generate_key")
|
|
224
|
+
|
|
225
|
+
@allow_generate_key.setter
|
|
226
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
227
|
+
pulumi.set(self, "allow_generate_key", value)
|
|
228
|
+
|
|
229
|
+
@_builtins.property
|
|
230
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
231
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
232
|
+
"""
|
|
233
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
234
|
+
"""
|
|
235
|
+
return pulumi.get(self, "allow_replace_key")
|
|
236
|
+
|
|
237
|
+
@allow_replace_key.setter
|
|
238
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
239
|
+
pulumi.set(self, "allow_replace_key", value)
|
|
240
|
+
|
|
241
|
+
@_builtins.property
|
|
242
|
+
@pulumi.getter(name="allowStoreKey")
|
|
243
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
244
|
+
"""
|
|
245
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
246
|
+
"""
|
|
247
|
+
return pulumi.get(self, "allow_store_key")
|
|
248
|
+
|
|
249
|
+
@allow_store_key.setter
|
|
250
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
251
|
+
pulumi.set(self, "allow_store_key", value)
|
|
252
|
+
|
|
253
|
+
@_builtins.property
|
|
254
|
+
@pulumi.getter(name="anyMount")
|
|
255
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
256
|
+
"""
|
|
257
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
258
|
+
"""
|
|
259
|
+
return pulumi.get(self, "any_mount")
|
|
260
|
+
|
|
261
|
+
@any_mount.setter
|
|
262
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
263
|
+
pulumi.set(self, "any_mount", value)
|
|
264
|
+
|
|
265
|
+
@_builtins.property
|
|
266
|
+
@pulumi.getter
|
|
267
|
+
def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
268
|
+
"""
|
|
269
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
|
270
|
+
"""
|
|
271
|
+
return pulumi.get(self, "curve")
|
|
272
|
+
|
|
273
|
+
@curve.setter
|
|
274
|
+
def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
275
|
+
pulumi.set(self, "curve", value)
|
|
276
|
+
|
|
277
|
+
@_builtins.property
|
|
278
|
+
@pulumi.getter
|
|
279
|
+
def endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
280
|
+
"""
|
|
281
|
+
Used to specify a custom AWS endpoint
|
|
282
|
+
"""
|
|
283
|
+
return pulumi.get(self, "endpoint")
|
|
284
|
+
|
|
285
|
+
@endpoint.setter
|
|
286
|
+
def endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
287
|
+
pulumi.set(self, "endpoint", value)
|
|
288
|
+
|
|
289
|
+
@_builtins.property
|
|
290
|
+
@pulumi.getter
|
|
291
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
292
|
+
"""
|
|
293
|
+
The AWS region where the keys are stored (or will be stored)
|
|
294
|
+
"""
|
|
295
|
+
return pulumi.get(self, "region")
|
|
296
|
+
|
|
297
|
+
@region.setter
|
|
298
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
299
|
+
pulumi.set(self, "region", value)
|
|
300
|
+
|
|
301
|
+
@_builtins.property
|
|
302
|
+
@pulumi.getter
|
|
303
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
304
|
+
"""
|
|
305
|
+
ID of the managed key read from Vault
|
|
306
|
+
"""
|
|
307
|
+
return pulumi.get(self, "uuid")
|
|
308
|
+
|
|
309
|
+
@uuid.setter
|
|
310
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
311
|
+
pulumi.set(self, "uuid", value)
|
|
312
|
+
|
|
313
|
+
|
|
314
|
+
if not MYPY:
|
|
315
|
+
class KeysAzureArgsDict(TypedDict):
|
|
316
|
+
client_id: pulumi.Input[_builtins.str]
|
|
317
|
+
"""
|
|
318
|
+
The client id for credentials to query the Azure APIs
|
|
319
|
+
"""
|
|
320
|
+
client_secret: pulumi.Input[_builtins.str]
|
|
321
|
+
"""
|
|
322
|
+
The client secret for credentials to query the Azure APIs
|
|
323
|
+
"""
|
|
324
|
+
key_name: pulumi.Input[_builtins.str]
|
|
325
|
+
"""
|
|
326
|
+
The Key Vault key to use for encryption and decryption
|
|
327
|
+
"""
|
|
328
|
+
key_type: pulumi.Input[_builtins.str]
|
|
329
|
+
"""
|
|
330
|
+
The type of key to use
|
|
331
|
+
"""
|
|
332
|
+
name: pulumi.Input[_builtins.str]
|
|
333
|
+
"""
|
|
334
|
+
A unique lowercase name that serves as identifying the key
|
|
335
|
+
"""
|
|
336
|
+
tenant_id: pulumi.Input[_builtins.str]
|
|
337
|
+
"""
|
|
338
|
+
The tenant id for the Azure Active Directory organization
|
|
339
|
+
"""
|
|
340
|
+
vault_name: pulumi.Input[_builtins.str]
|
|
341
|
+
"""
|
|
342
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
|
343
|
+
"""
|
|
344
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
345
|
+
"""
|
|
346
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
347
|
+
"""
|
|
348
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
349
|
+
"""
|
|
350
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
351
|
+
"""
|
|
352
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
353
|
+
"""
|
|
354
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
355
|
+
"""
|
|
356
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
|
357
|
+
"""
|
|
358
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
359
|
+
"""
|
|
360
|
+
environment: NotRequired[pulumi.Input[_builtins.str]]
|
|
361
|
+
"""
|
|
362
|
+
The Azure Cloud environment API endpoints to use
|
|
363
|
+
"""
|
|
364
|
+
key_bits: NotRequired[pulumi.Input[_builtins.str]]
|
|
365
|
+
"""
|
|
366
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
|
367
|
+
"""
|
|
368
|
+
resource: NotRequired[pulumi.Input[_builtins.str]]
|
|
369
|
+
"""
|
|
370
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
|
371
|
+
"""
|
|
372
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
|
373
|
+
"""
|
|
374
|
+
ID of the managed key read from Vault
|
|
375
|
+
"""
|
|
376
|
+
elif False:
|
|
377
|
+
KeysAzureArgsDict: TypeAlias = Mapping[str, Any]
|
|
378
|
+
|
|
379
|
+
@pulumi.input_type
|
|
380
|
+
class KeysAzureArgs:
|
|
381
|
+
def __init__(__self__, *,
|
|
382
|
+
client_id: pulumi.Input[_builtins.str],
|
|
383
|
+
client_secret: pulumi.Input[_builtins.str],
|
|
384
|
+
key_name: pulumi.Input[_builtins.str],
|
|
385
|
+
key_type: pulumi.Input[_builtins.str],
|
|
386
|
+
name: pulumi.Input[_builtins.str],
|
|
387
|
+
tenant_id: pulumi.Input[_builtins.str],
|
|
388
|
+
vault_name: pulumi.Input[_builtins.str],
|
|
389
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
390
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
391
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
392
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
393
|
+
environment: Optional[pulumi.Input[_builtins.str]] = None,
|
|
394
|
+
key_bits: Optional[pulumi.Input[_builtins.str]] = None,
|
|
395
|
+
resource: Optional[pulumi.Input[_builtins.str]] = None,
|
|
396
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
|
397
|
+
"""
|
|
398
|
+
:param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs
|
|
399
|
+
:param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the Azure APIs
|
|
400
|
+
:param pulumi.Input[_builtins.str] key_name: The Key Vault key to use for encryption and decryption
|
|
401
|
+
:param pulumi.Input[_builtins.str] key_type: The type of key to use
|
|
402
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
|
403
|
+
:param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory organization
|
|
404
|
+
:param pulumi.Input[_builtins.str] vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
|
405
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
406
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
407
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
408
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
409
|
+
:param pulumi.Input[_builtins.str] environment: The Azure Cloud environment API endpoints to use
|
|
410
|
+
:param pulumi.Input[_builtins.str] key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
|
411
|
+
:param pulumi.Input[_builtins.str] resource: The Azure Key Vault resource's DNS Suffix to connect to
|
|
412
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
|
413
|
+
"""
|
|
414
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
415
|
+
pulumi.set(__self__, "client_secret", client_secret)
|
|
416
|
+
pulumi.set(__self__, "key_name", key_name)
|
|
417
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
418
|
+
pulumi.set(__self__, "name", name)
|
|
419
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
420
|
+
pulumi.set(__self__, "vault_name", vault_name)
|
|
421
|
+
if allow_generate_key is not None:
|
|
422
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
423
|
+
if allow_replace_key is not None:
|
|
424
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
425
|
+
if allow_store_key is not None:
|
|
426
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
427
|
+
if any_mount is not None:
|
|
428
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
429
|
+
if environment is not None:
|
|
430
|
+
pulumi.set(__self__, "environment", environment)
|
|
431
|
+
if key_bits is not None:
|
|
432
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
433
|
+
if resource is not None:
|
|
434
|
+
pulumi.set(__self__, "resource", resource)
|
|
435
|
+
if uuid is not None:
|
|
436
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
437
|
+
|
|
438
|
+
@_builtins.property
|
|
439
|
+
@pulumi.getter(name="clientId")
|
|
440
|
+
def client_id(self) -> pulumi.Input[_builtins.str]:
|
|
441
|
+
"""
|
|
442
|
+
The client id for credentials to query the Azure APIs
|
|
443
|
+
"""
|
|
444
|
+
return pulumi.get(self, "client_id")
|
|
445
|
+
|
|
446
|
+
@client_id.setter
|
|
447
|
+
def client_id(self, value: pulumi.Input[_builtins.str]):
|
|
448
|
+
pulumi.set(self, "client_id", value)
|
|
449
|
+
|
|
450
|
+
@_builtins.property
|
|
451
|
+
@pulumi.getter(name="clientSecret")
|
|
452
|
+
def client_secret(self) -> pulumi.Input[_builtins.str]:
|
|
453
|
+
"""
|
|
454
|
+
The client secret for credentials to query the Azure APIs
|
|
455
|
+
"""
|
|
456
|
+
return pulumi.get(self, "client_secret")
|
|
457
|
+
|
|
458
|
+
@client_secret.setter
|
|
459
|
+
def client_secret(self, value: pulumi.Input[_builtins.str]):
|
|
460
|
+
pulumi.set(self, "client_secret", value)
|
|
461
|
+
|
|
462
|
+
@_builtins.property
|
|
463
|
+
@pulumi.getter(name="keyName")
|
|
464
|
+
def key_name(self) -> pulumi.Input[_builtins.str]:
|
|
465
|
+
"""
|
|
466
|
+
The Key Vault key to use for encryption and decryption
|
|
467
|
+
"""
|
|
468
|
+
return pulumi.get(self, "key_name")
|
|
469
|
+
|
|
470
|
+
@key_name.setter
|
|
471
|
+
def key_name(self, value: pulumi.Input[_builtins.str]):
|
|
472
|
+
pulumi.set(self, "key_name", value)
|
|
473
|
+
|
|
474
|
+
@_builtins.property
|
|
475
|
+
@pulumi.getter(name="keyType")
|
|
476
|
+
def key_type(self) -> pulumi.Input[_builtins.str]:
|
|
477
|
+
"""
|
|
478
|
+
The type of key to use
|
|
479
|
+
"""
|
|
480
|
+
return pulumi.get(self, "key_type")
|
|
481
|
+
|
|
482
|
+
@key_type.setter
|
|
483
|
+
def key_type(self, value: pulumi.Input[_builtins.str]):
|
|
484
|
+
pulumi.set(self, "key_type", value)
|
|
485
|
+
|
|
486
|
+
@_builtins.property
|
|
487
|
+
@pulumi.getter
|
|
488
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
|
489
|
+
"""
|
|
490
|
+
A unique lowercase name that serves as identifying the key
|
|
491
|
+
"""
|
|
492
|
+
return pulumi.get(self, "name")
|
|
493
|
+
|
|
494
|
+
@name.setter
|
|
495
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
|
496
|
+
pulumi.set(self, "name", value)
|
|
497
|
+
|
|
498
|
+
@_builtins.property
|
|
499
|
+
@pulumi.getter(name="tenantId")
|
|
500
|
+
def tenant_id(self) -> pulumi.Input[_builtins.str]:
|
|
501
|
+
"""
|
|
502
|
+
The tenant id for the Azure Active Directory organization
|
|
503
|
+
"""
|
|
504
|
+
return pulumi.get(self, "tenant_id")
|
|
505
|
+
|
|
506
|
+
@tenant_id.setter
|
|
507
|
+
def tenant_id(self, value: pulumi.Input[_builtins.str]):
|
|
508
|
+
pulumi.set(self, "tenant_id", value)
|
|
509
|
+
|
|
510
|
+
@_builtins.property
|
|
511
|
+
@pulumi.getter(name="vaultName")
|
|
512
|
+
def vault_name(self) -> pulumi.Input[_builtins.str]:
|
|
513
|
+
"""
|
|
514
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
|
515
|
+
"""
|
|
516
|
+
return pulumi.get(self, "vault_name")
|
|
517
|
+
|
|
518
|
+
@vault_name.setter
|
|
519
|
+
def vault_name(self, value: pulumi.Input[_builtins.str]):
|
|
520
|
+
pulumi.set(self, "vault_name", value)
|
|
521
|
+
|
|
522
|
+
@_builtins.property
|
|
523
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
524
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
525
|
+
"""
|
|
526
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
527
|
+
"""
|
|
528
|
+
return pulumi.get(self, "allow_generate_key")
|
|
529
|
+
|
|
530
|
+
@allow_generate_key.setter
|
|
531
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
532
|
+
pulumi.set(self, "allow_generate_key", value)
|
|
533
|
+
|
|
534
|
+
@_builtins.property
|
|
535
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
536
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
537
|
+
"""
|
|
538
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
539
|
+
"""
|
|
540
|
+
return pulumi.get(self, "allow_replace_key")
|
|
541
|
+
|
|
542
|
+
@allow_replace_key.setter
|
|
543
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
544
|
+
pulumi.set(self, "allow_replace_key", value)
|
|
545
|
+
|
|
546
|
+
@_builtins.property
|
|
547
|
+
@pulumi.getter(name="allowStoreKey")
|
|
548
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
549
|
+
"""
|
|
550
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
551
|
+
"""
|
|
552
|
+
return pulumi.get(self, "allow_store_key")
|
|
553
|
+
|
|
554
|
+
@allow_store_key.setter
|
|
555
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
556
|
+
pulumi.set(self, "allow_store_key", value)
|
|
557
|
+
|
|
558
|
+
@_builtins.property
|
|
559
|
+
@pulumi.getter(name="anyMount")
|
|
560
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
561
|
+
"""
|
|
562
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
563
|
+
"""
|
|
564
|
+
return pulumi.get(self, "any_mount")
|
|
565
|
+
|
|
566
|
+
@any_mount.setter
|
|
567
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
568
|
+
pulumi.set(self, "any_mount", value)
|
|
569
|
+
|
|
570
|
+
@_builtins.property
|
|
571
|
+
@pulumi.getter
|
|
572
|
+
def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
573
|
+
"""
|
|
574
|
+
The Azure Cloud environment API endpoints to use
|
|
575
|
+
"""
|
|
576
|
+
return pulumi.get(self, "environment")
|
|
577
|
+
|
|
578
|
+
@environment.setter
|
|
579
|
+
def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
580
|
+
pulumi.set(self, "environment", value)
|
|
581
|
+
|
|
582
|
+
@_builtins.property
|
|
583
|
+
@pulumi.getter(name="keyBits")
|
|
584
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
585
|
+
"""
|
|
586
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
|
587
|
+
"""
|
|
588
|
+
return pulumi.get(self, "key_bits")
|
|
589
|
+
|
|
590
|
+
@key_bits.setter
|
|
591
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
592
|
+
pulumi.set(self, "key_bits", value)
|
|
593
|
+
|
|
594
|
+
@_builtins.property
|
|
595
|
+
@pulumi.getter
|
|
596
|
+
def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
597
|
+
"""
|
|
598
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
|
599
|
+
"""
|
|
600
|
+
return pulumi.get(self, "resource")
|
|
601
|
+
|
|
602
|
+
@resource.setter
|
|
603
|
+
def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
604
|
+
pulumi.set(self, "resource", value)
|
|
605
|
+
|
|
606
|
+
@_builtins.property
|
|
607
|
+
@pulumi.getter
|
|
608
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
609
|
+
"""
|
|
610
|
+
ID of the managed key read from Vault
|
|
611
|
+
"""
|
|
612
|
+
return pulumi.get(self, "uuid")
|
|
613
|
+
|
|
614
|
+
@uuid.setter
|
|
615
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
616
|
+
pulumi.set(self, "uuid", value)
|
|
617
|
+
|
|
618
|
+
|
|
619
|
+
if not MYPY:
|
|
620
|
+
class KeysPkcArgsDict(TypedDict):
|
|
621
|
+
key_id: pulumi.Input[_builtins.str]
|
|
622
|
+
"""
|
|
623
|
+
The id of a PKCS#11 key to use
|
|
624
|
+
"""
|
|
625
|
+
key_label: pulumi.Input[_builtins.str]
|
|
626
|
+
"""
|
|
627
|
+
The label of the key to use
|
|
628
|
+
"""
|
|
629
|
+
library: pulumi.Input[_builtins.str]
|
|
630
|
+
"""
|
|
631
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
|
632
|
+
"""
|
|
633
|
+
mechanism: pulumi.Input[_builtins.str]
|
|
634
|
+
"""
|
|
635
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
|
636
|
+
"""
|
|
637
|
+
name: pulumi.Input[_builtins.str]
|
|
638
|
+
"""
|
|
639
|
+
A unique lowercase name that serves as identifying the key
|
|
640
|
+
"""
|
|
641
|
+
pin: pulumi.Input[_builtins.str]
|
|
642
|
+
"""
|
|
643
|
+
The PIN for login
|
|
644
|
+
"""
|
|
645
|
+
allow_generate_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
646
|
+
"""
|
|
647
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
648
|
+
"""
|
|
649
|
+
allow_replace_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
650
|
+
"""
|
|
651
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
652
|
+
"""
|
|
653
|
+
allow_store_key: NotRequired[pulumi.Input[_builtins.bool]]
|
|
654
|
+
"""
|
|
655
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
656
|
+
"""
|
|
657
|
+
any_mount: NotRequired[pulumi.Input[_builtins.bool]]
|
|
658
|
+
"""
|
|
659
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
660
|
+
"""
|
|
661
|
+
curve: NotRequired[pulumi.Input[_builtins.str]]
|
|
662
|
+
"""
|
|
663
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
|
664
|
+
"""
|
|
665
|
+
force_rw_session: NotRequired[pulumi.Input[_builtins.str]]
|
|
666
|
+
"""
|
|
667
|
+
Force all operations to open up a read-write session to the HSM
|
|
668
|
+
"""
|
|
669
|
+
key_bits: NotRequired[pulumi.Input[_builtins.str]]
|
|
670
|
+
"""
|
|
671
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
|
672
|
+
"""
|
|
673
|
+
slot: NotRequired[pulumi.Input[_builtins.str]]
|
|
674
|
+
"""
|
|
675
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
|
676
|
+
"""
|
|
677
|
+
token_label: NotRequired[pulumi.Input[_builtins.str]]
|
|
678
|
+
"""
|
|
679
|
+
The slot token label to use
|
|
680
|
+
"""
|
|
681
|
+
uuid: NotRequired[pulumi.Input[_builtins.str]]
|
|
682
|
+
"""
|
|
683
|
+
ID of the managed key read from Vault
|
|
684
|
+
"""
|
|
685
|
+
elif False:
|
|
686
|
+
KeysPkcArgsDict: TypeAlias = Mapping[str, Any]
|
|
687
|
+
|
|
688
|
+
@pulumi.input_type
|
|
689
|
+
class KeysPkcArgs:
|
|
690
|
+
def __init__(__self__, *,
|
|
691
|
+
key_id: pulumi.Input[_builtins.str],
|
|
692
|
+
key_label: pulumi.Input[_builtins.str],
|
|
693
|
+
library: pulumi.Input[_builtins.str],
|
|
694
|
+
mechanism: pulumi.Input[_builtins.str],
|
|
695
|
+
name: pulumi.Input[_builtins.str],
|
|
696
|
+
pin: pulumi.Input[_builtins.str],
|
|
697
|
+
allow_generate_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
698
|
+
allow_replace_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
699
|
+
allow_store_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
700
|
+
any_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
701
|
+
curve: Optional[pulumi.Input[_builtins.str]] = None,
|
|
702
|
+
force_rw_session: Optional[pulumi.Input[_builtins.str]] = None,
|
|
703
|
+
key_bits: Optional[pulumi.Input[_builtins.str]] = None,
|
|
704
|
+
slot: Optional[pulumi.Input[_builtins.str]] = None,
|
|
705
|
+
token_label: Optional[pulumi.Input[_builtins.str]] = None,
|
|
706
|
+
uuid: Optional[pulumi.Input[_builtins.str]] = None):
|
|
707
|
+
"""
|
|
708
|
+
:param pulumi.Input[_builtins.str] key_id: The id of a PKCS#11 key to use
|
|
709
|
+
:param pulumi.Input[_builtins.str] key_label: The label of the key to use
|
|
710
|
+
:param pulumi.Input[_builtins.str] library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
|
711
|
+
:param pulumi.Input[_builtins.str] mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
|
712
|
+
:param pulumi.Input[_builtins.str] name: A unique lowercase name that serves as identifying the key
|
|
713
|
+
:param pulumi.Input[_builtins.str] pin: The PIN for login
|
|
714
|
+
:param pulumi.Input[_builtins.bool] allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
715
|
+
:param pulumi.Input[_builtins.bool] allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
716
|
+
:param pulumi.Input[_builtins.bool] allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
717
|
+
:param pulumi.Input[_builtins.bool] any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
718
|
+
:param pulumi.Input[_builtins.str] curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
|
719
|
+
:param pulumi.Input[_builtins.str] force_rw_session: Force all operations to open up a read-write session to the HSM
|
|
720
|
+
:param pulumi.Input[_builtins.str] key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
|
721
|
+
:param pulumi.Input[_builtins.str] slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
|
722
|
+
:param pulumi.Input[_builtins.str] token_label: The slot token label to use
|
|
723
|
+
:param pulumi.Input[_builtins.str] uuid: ID of the managed key read from Vault
|
|
724
|
+
"""
|
|
725
|
+
pulumi.set(__self__, "key_id", key_id)
|
|
726
|
+
pulumi.set(__self__, "key_label", key_label)
|
|
727
|
+
pulumi.set(__self__, "library", library)
|
|
728
|
+
pulumi.set(__self__, "mechanism", mechanism)
|
|
729
|
+
pulumi.set(__self__, "name", name)
|
|
730
|
+
pulumi.set(__self__, "pin", pin)
|
|
731
|
+
if allow_generate_key is not None:
|
|
732
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
733
|
+
if allow_replace_key is not None:
|
|
734
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
735
|
+
if allow_store_key is not None:
|
|
736
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
737
|
+
if any_mount is not None:
|
|
738
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
739
|
+
if curve is not None:
|
|
740
|
+
pulumi.set(__self__, "curve", curve)
|
|
741
|
+
if force_rw_session is not None:
|
|
742
|
+
pulumi.set(__self__, "force_rw_session", force_rw_session)
|
|
743
|
+
if key_bits is not None:
|
|
744
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
745
|
+
if slot is not None:
|
|
746
|
+
pulumi.set(__self__, "slot", slot)
|
|
747
|
+
if token_label is not None:
|
|
748
|
+
pulumi.set(__self__, "token_label", token_label)
|
|
749
|
+
if uuid is not None:
|
|
750
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
751
|
+
|
|
752
|
+
@_builtins.property
|
|
753
|
+
@pulumi.getter(name="keyId")
|
|
754
|
+
def key_id(self) -> pulumi.Input[_builtins.str]:
|
|
755
|
+
"""
|
|
756
|
+
The id of a PKCS#11 key to use
|
|
757
|
+
"""
|
|
758
|
+
return pulumi.get(self, "key_id")
|
|
759
|
+
|
|
760
|
+
@key_id.setter
|
|
761
|
+
def key_id(self, value: pulumi.Input[_builtins.str]):
|
|
762
|
+
pulumi.set(self, "key_id", value)
|
|
763
|
+
|
|
764
|
+
@_builtins.property
|
|
765
|
+
@pulumi.getter(name="keyLabel")
|
|
766
|
+
def key_label(self) -> pulumi.Input[_builtins.str]:
|
|
767
|
+
"""
|
|
768
|
+
The label of the key to use
|
|
769
|
+
"""
|
|
770
|
+
return pulumi.get(self, "key_label")
|
|
771
|
+
|
|
772
|
+
@key_label.setter
|
|
773
|
+
def key_label(self, value: pulumi.Input[_builtins.str]):
|
|
774
|
+
pulumi.set(self, "key_label", value)
|
|
775
|
+
|
|
776
|
+
@_builtins.property
|
|
777
|
+
@pulumi.getter
|
|
778
|
+
def library(self) -> pulumi.Input[_builtins.str]:
|
|
779
|
+
"""
|
|
780
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
|
781
|
+
"""
|
|
782
|
+
return pulumi.get(self, "library")
|
|
783
|
+
|
|
784
|
+
@library.setter
|
|
785
|
+
def library(self, value: pulumi.Input[_builtins.str]):
|
|
786
|
+
pulumi.set(self, "library", value)
|
|
787
|
+
|
|
788
|
+
@_builtins.property
|
|
789
|
+
@pulumi.getter
|
|
790
|
+
def mechanism(self) -> pulumi.Input[_builtins.str]:
|
|
791
|
+
"""
|
|
792
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
|
793
|
+
"""
|
|
794
|
+
return pulumi.get(self, "mechanism")
|
|
795
|
+
|
|
796
|
+
@mechanism.setter
|
|
797
|
+
def mechanism(self, value: pulumi.Input[_builtins.str]):
|
|
798
|
+
pulumi.set(self, "mechanism", value)
|
|
799
|
+
|
|
800
|
+
@_builtins.property
|
|
801
|
+
@pulumi.getter
|
|
802
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
|
803
|
+
"""
|
|
804
|
+
A unique lowercase name that serves as identifying the key
|
|
805
|
+
"""
|
|
806
|
+
return pulumi.get(self, "name")
|
|
807
|
+
|
|
808
|
+
@name.setter
|
|
809
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
|
810
|
+
pulumi.set(self, "name", value)
|
|
811
|
+
|
|
812
|
+
@_builtins.property
|
|
813
|
+
@pulumi.getter
|
|
814
|
+
def pin(self) -> pulumi.Input[_builtins.str]:
|
|
815
|
+
"""
|
|
816
|
+
The PIN for login
|
|
817
|
+
"""
|
|
818
|
+
return pulumi.get(self, "pin")
|
|
819
|
+
|
|
820
|
+
@pin.setter
|
|
821
|
+
def pin(self, value: pulumi.Input[_builtins.str]):
|
|
822
|
+
pulumi.set(self, "pin", value)
|
|
823
|
+
|
|
824
|
+
@_builtins.property
|
|
825
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
826
|
+
def allow_generate_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
827
|
+
"""
|
|
828
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
829
|
+
"""
|
|
830
|
+
return pulumi.get(self, "allow_generate_key")
|
|
831
|
+
|
|
832
|
+
@allow_generate_key.setter
|
|
833
|
+
def allow_generate_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
834
|
+
pulumi.set(self, "allow_generate_key", value)
|
|
835
|
+
|
|
836
|
+
@_builtins.property
|
|
837
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
838
|
+
def allow_replace_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
839
|
+
"""
|
|
840
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
841
|
+
"""
|
|
842
|
+
return pulumi.get(self, "allow_replace_key")
|
|
843
|
+
|
|
844
|
+
@allow_replace_key.setter
|
|
845
|
+
def allow_replace_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
846
|
+
pulumi.set(self, "allow_replace_key", value)
|
|
847
|
+
|
|
848
|
+
@_builtins.property
|
|
849
|
+
@pulumi.getter(name="allowStoreKey")
|
|
850
|
+
def allow_store_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
851
|
+
"""
|
|
852
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
853
|
+
"""
|
|
854
|
+
return pulumi.get(self, "allow_store_key")
|
|
855
|
+
|
|
856
|
+
@allow_store_key.setter
|
|
857
|
+
def allow_store_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
858
|
+
pulumi.set(self, "allow_store_key", value)
|
|
859
|
+
|
|
860
|
+
@_builtins.property
|
|
861
|
+
@pulumi.getter(name="anyMount")
|
|
862
|
+
def any_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
863
|
+
"""
|
|
864
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
865
|
+
"""
|
|
866
|
+
return pulumi.get(self, "any_mount")
|
|
867
|
+
|
|
868
|
+
@any_mount.setter
|
|
869
|
+
def any_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
870
|
+
pulumi.set(self, "any_mount", value)
|
|
871
|
+
|
|
872
|
+
@_builtins.property
|
|
873
|
+
@pulumi.getter
|
|
874
|
+
def curve(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
875
|
+
"""
|
|
876
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
|
877
|
+
"""
|
|
878
|
+
return pulumi.get(self, "curve")
|
|
879
|
+
|
|
880
|
+
@curve.setter
|
|
881
|
+
def curve(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
882
|
+
pulumi.set(self, "curve", value)
|
|
883
|
+
|
|
884
|
+
@_builtins.property
|
|
885
|
+
@pulumi.getter(name="forceRwSession")
|
|
886
|
+
def force_rw_session(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
887
|
+
"""
|
|
888
|
+
Force all operations to open up a read-write session to the HSM
|
|
889
|
+
"""
|
|
890
|
+
return pulumi.get(self, "force_rw_session")
|
|
891
|
+
|
|
892
|
+
@force_rw_session.setter
|
|
893
|
+
def force_rw_session(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
894
|
+
pulumi.set(self, "force_rw_session", value)
|
|
895
|
+
|
|
896
|
+
@_builtins.property
|
|
897
|
+
@pulumi.getter(name="keyBits")
|
|
898
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
899
|
+
"""
|
|
900
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
|
901
|
+
"""
|
|
902
|
+
return pulumi.get(self, "key_bits")
|
|
903
|
+
|
|
904
|
+
@key_bits.setter
|
|
905
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
906
|
+
pulumi.set(self, "key_bits", value)
|
|
907
|
+
|
|
908
|
+
@_builtins.property
|
|
909
|
+
@pulumi.getter
|
|
910
|
+
def slot(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
911
|
+
"""
|
|
912
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
|
913
|
+
"""
|
|
914
|
+
return pulumi.get(self, "slot")
|
|
915
|
+
|
|
916
|
+
@slot.setter
|
|
917
|
+
def slot(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
918
|
+
pulumi.set(self, "slot", value)
|
|
919
|
+
|
|
920
|
+
@_builtins.property
|
|
921
|
+
@pulumi.getter(name="tokenLabel")
|
|
922
|
+
def token_label(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
923
|
+
"""
|
|
924
|
+
The slot token label to use
|
|
925
|
+
"""
|
|
926
|
+
return pulumi.get(self, "token_label")
|
|
927
|
+
|
|
928
|
+
@token_label.setter
|
|
929
|
+
def token_label(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
930
|
+
pulumi.set(self, "token_label", value)
|
|
931
|
+
|
|
932
|
+
@_builtins.property
|
|
933
|
+
@pulumi.getter
|
|
934
|
+
def uuid(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
935
|
+
"""
|
|
936
|
+
ID of the managed key read from Vault
|
|
937
|
+
"""
|
|
938
|
+
return pulumi.get(self, "uuid")
|
|
939
|
+
|
|
940
|
+
@uuid.setter
|
|
941
|
+
def uuid(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
942
|
+
pulumi.set(self, "uuid", value)
|
|
943
|
+
|
|
944
|
+
|