pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,667 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'KeysAw',
19
+ 'KeysAzure',
20
+ 'KeysPkc',
21
+ ]
22
+
23
+ @pulumi.output_type
24
+ class KeysAw(dict):
25
+ @staticmethod
26
+ def __key_warning(key: str):
27
+ suggest = None
28
+ if key == "accessKey":
29
+ suggest = "access_key"
30
+ elif key == "keyBits":
31
+ suggest = "key_bits"
32
+ elif key == "keyType":
33
+ suggest = "key_type"
34
+ elif key == "kmsKey":
35
+ suggest = "kms_key"
36
+ elif key == "secretKey":
37
+ suggest = "secret_key"
38
+ elif key == "allowGenerateKey":
39
+ suggest = "allow_generate_key"
40
+ elif key == "allowReplaceKey":
41
+ suggest = "allow_replace_key"
42
+ elif key == "allowStoreKey":
43
+ suggest = "allow_store_key"
44
+ elif key == "anyMount":
45
+ suggest = "any_mount"
46
+
47
+ if suggest:
48
+ pulumi.log.warn(f"Key '{key}' not found in KeysAw. Access the value via the '{suggest}' property getter instead.")
49
+
50
+ def __getitem__(self, key: str) -> Any:
51
+ KeysAw.__key_warning(key)
52
+ return super().__getitem__(key)
53
+
54
+ def get(self, key: str, default = None) -> Any:
55
+ KeysAw.__key_warning(key)
56
+ return super().get(key, default)
57
+
58
+ def __init__(__self__, *,
59
+ access_key: _builtins.str,
60
+ key_bits: _builtins.str,
61
+ key_type: _builtins.str,
62
+ kms_key: _builtins.str,
63
+ name: _builtins.str,
64
+ secret_key: _builtins.str,
65
+ allow_generate_key: Optional[_builtins.bool] = None,
66
+ allow_replace_key: Optional[_builtins.bool] = None,
67
+ allow_store_key: Optional[_builtins.bool] = None,
68
+ any_mount: Optional[_builtins.bool] = None,
69
+ curve: Optional[_builtins.str] = None,
70
+ endpoint: Optional[_builtins.str] = None,
71
+ region: Optional[_builtins.str] = None,
72
+ uuid: Optional[_builtins.str] = None):
73
+ """
74
+ :param _builtins.str access_key: The AWS access key to use
75
+ :param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
76
+ :param _builtins.str key_type: The type of key to use
77
+ :param _builtins.str kms_key: An identifier for the key
78
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
79
+ :param _builtins.str secret_key: The AWS secret key to use
80
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
81
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
82
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
83
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
84
+ :param _builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
85
+ :param _builtins.str endpoint: Used to specify a custom AWS endpoint
86
+ :param _builtins.str region: The AWS region where the keys are stored (or will be stored)
87
+ :param _builtins.str uuid: ID of the managed key read from Vault
88
+ """
89
+ pulumi.set(__self__, "access_key", access_key)
90
+ pulumi.set(__self__, "key_bits", key_bits)
91
+ pulumi.set(__self__, "key_type", key_type)
92
+ pulumi.set(__self__, "kms_key", kms_key)
93
+ pulumi.set(__self__, "name", name)
94
+ pulumi.set(__self__, "secret_key", secret_key)
95
+ if allow_generate_key is not None:
96
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
97
+ if allow_replace_key is not None:
98
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
99
+ if allow_store_key is not None:
100
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
101
+ if any_mount is not None:
102
+ pulumi.set(__self__, "any_mount", any_mount)
103
+ if curve is not None:
104
+ pulumi.set(__self__, "curve", curve)
105
+ if endpoint is not None:
106
+ pulumi.set(__self__, "endpoint", endpoint)
107
+ if region is not None:
108
+ pulumi.set(__self__, "region", region)
109
+ if uuid is not None:
110
+ pulumi.set(__self__, "uuid", uuid)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter(name="accessKey")
114
+ def access_key(self) -> _builtins.str:
115
+ """
116
+ The AWS access key to use
117
+ """
118
+ return pulumi.get(self, "access_key")
119
+
120
+ @_builtins.property
121
+ @pulumi.getter(name="keyBits")
122
+ def key_bits(self) -> _builtins.str:
123
+ """
124
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
125
+ """
126
+ return pulumi.get(self, "key_bits")
127
+
128
+ @_builtins.property
129
+ @pulumi.getter(name="keyType")
130
+ def key_type(self) -> _builtins.str:
131
+ """
132
+ The type of key to use
133
+ """
134
+ return pulumi.get(self, "key_type")
135
+
136
+ @_builtins.property
137
+ @pulumi.getter(name="kmsKey")
138
+ def kms_key(self) -> _builtins.str:
139
+ """
140
+ An identifier for the key
141
+ """
142
+ return pulumi.get(self, "kms_key")
143
+
144
+ @_builtins.property
145
+ @pulumi.getter
146
+ def name(self) -> _builtins.str:
147
+ """
148
+ A unique lowercase name that serves as identifying the key
149
+ """
150
+ return pulumi.get(self, "name")
151
+
152
+ @_builtins.property
153
+ @pulumi.getter(name="secretKey")
154
+ def secret_key(self) -> _builtins.str:
155
+ """
156
+ The AWS secret key to use
157
+ """
158
+ return pulumi.get(self, "secret_key")
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="allowGenerateKey")
162
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
163
+ """
164
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
165
+ """
166
+ return pulumi.get(self, "allow_generate_key")
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="allowReplaceKey")
170
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
171
+ """
172
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
173
+ """
174
+ return pulumi.get(self, "allow_replace_key")
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="allowStoreKey")
178
+ def allow_store_key(self) -> Optional[_builtins.bool]:
179
+ """
180
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
181
+ """
182
+ return pulumi.get(self, "allow_store_key")
183
+
184
+ @_builtins.property
185
+ @pulumi.getter(name="anyMount")
186
+ def any_mount(self) -> Optional[_builtins.bool]:
187
+ """
188
+ Allow usage from any mount point within the namespace if 'true'
189
+ """
190
+ return pulumi.get(self, "any_mount")
191
+
192
+ @_builtins.property
193
+ @pulumi.getter
194
+ def curve(self) -> Optional[_builtins.str]:
195
+ """
196
+ The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
197
+ """
198
+ return pulumi.get(self, "curve")
199
+
200
+ @_builtins.property
201
+ @pulumi.getter
202
+ def endpoint(self) -> Optional[_builtins.str]:
203
+ """
204
+ Used to specify a custom AWS endpoint
205
+ """
206
+ return pulumi.get(self, "endpoint")
207
+
208
+ @_builtins.property
209
+ @pulumi.getter
210
+ def region(self) -> Optional[_builtins.str]:
211
+ """
212
+ The AWS region where the keys are stored (or will be stored)
213
+ """
214
+ return pulumi.get(self, "region")
215
+
216
+ @_builtins.property
217
+ @pulumi.getter
218
+ def uuid(self) -> Optional[_builtins.str]:
219
+ """
220
+ ID of the managed key read from Vault
221
+ """
222
+ return pulumi.get(self, "uuid")
223
+
224
+
225
+ @pulumi.output_type
226
+ class KeysAzure(dict):
227
+ @staticmethod
228
+ def __key_warning(key: str):
229
+ suggest = None
230
+ if key == "clientId":
231
+ suggest = "client_id"
232
+ elif key == "clientSecret":
233
+ suggest = "client_secret"
234
+ elif key == "keyName":
235
+ suggest = "key_name"
236
+ elif key == "keyType":
237
+ suggest = "key_type"
238
+ elif key == "tenantId":
239
+ suggest = "tenant_id"
240
+ elif key == "vaultName":
241
+ suggest = "vault_name"
242
+ elif key == "allowGenerateKey":
243
+ suggest = "allow_generate_key"
244
+ elif key == "allowReplaceKey":
245
+ suggest = "allow_replace_key"
246
+ elif key == "allowStoreKey":
247
+ suggest = "allow_store_key"
248
+ elif key == "anyMount":
249
+ suggest = "any_mount"
250
+ elif key == "keyBits":
251
+ suggest = "key_bits"
252
+
253
+ if suggest:
254
+ pulumi.log.warn(f"Key '{key}' not found in KeysAzure. Access the value via the '{suggest}' property getter instead.")
255
+
256
+ def __getitem__(self, key: str) -> Any:
257
+ KeysAzure.__key_warning(key)
258
+ return super().__getitem__(key)
259
+
260
+ def get(self, key: str, default = None) -> Any:
261
+ KeysAzure.__key_warning(key)
262
+ return super().get(key, default)
263
+
264
+ def __init__(__self__, *,
265
+ client_id: _builtins.str,
266
+ client_secret: _builtins.str,
267
+ key_name: _builtins.str,
268
+ key_type: _builtins.str,
269
+ name: _builtins.str,
270
+ tenant_id: _builtins.str,
271
+ vault_name: _builtins.str,
272
+ allow_generate_key: Optional[_builtins.bool] = None,
273
+ allow_replace_key: Optional[_builtins.bool] = None,
274
+ allow_store_key: Optional[_builtins.bool] = None,
275
+ any_mount: Optional[_builtins.bool] = None,
276
+ environment: Optional[_builtins.str] = None,
277
+ key_bits: Optional[_builtins.str] = None,
278
+ resource: Optional[_builtins.str] = None,
279
+ uuid: Optional[_builtins.str] = None):
280
+ """
281
+ :param _builtins.str client_id: The client id for credentials to query the Azure APIs
282
+ :param _builtins.str client_secret: The client secret for credentials to query the Azure APIs
283
+ :param _builtins.str key_name: The Key Vault key to use for encryption and decryption
284
+ :param _builtins.str key_type: The type of key to use
285
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
286
+ :param _builtins.str tenant_id: The tenant id for the Azure Active Directory organization
287
+ :param _builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
288
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
289
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
290
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
291
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
292
+ :param _builtins.str environment: The Azure Cloud environment API endpoints to use
293
+ :param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
294
+ :param _builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
295
+ :param _builtins.str uuid: ID of the managed key read from Vault
296
+ """
297
+ pulumi.set(__self__, "client_id", client_id)
298
+ pulumi.set(__self__, "client_secret", client_secret)
299
+ pulumi.set(__self__, "key_name", key_name)
300
+ pulumi.set(__self__, "key_type", key_type)
301
+ pulumi.set(__self__, "name", name)
302
+ pulumi.set(__self__, "tenant_id", tenant_id)
303
+ pulumi.set(__self__, "vault_name", vault_name)
304
+ if allow_generate_key is not None:
305
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
306
+ if allow_replace_key is not None:
307
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
308
+ if allow_store_key is not None:
309
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
310
+ if any_mount is not None:
311
+ pulumi.set(__self__, "any_mount", any_mount)
312
+ if environment is not None:
313
+ pulumi.set(__self__, "environment", environment)
314
+ if key_bits is not None:
315
+ pulumi.set(__self__, "key_bits", key_bits)
316
+ if resource is not None:
317
+ pulumi.set(__self__, "resource", resource)
318
+ if uuid is not None:
319
+ pulumi.set(__self__, "uuid", uuid)
320
+
321
+ @_builtins.property
322
+ @pulumi.getter(name="clientId")
323
+ def client_id(self) -> _builtins.str:
324
+ """
325
+ The client id for credentials to query the Azure APIs
326
+ """
327
+ return pulumi.get(self, "client_id")
328
+
329
+ @_builtins.property
330
+ @pulumi.getter(name="clientSecret")
331
+ def client_secret(self) -> _builtins.str:
332
+ """
333
+ The client secret for credentials to query the Azure APIs
334
+ """
335
+ return pulumi.get(self, "client_secret")
336
+
337
+ @_builtins.property
338
+ @pulumi.getter(name="keyName")
339
+ def key_name(self) -> _builtins.str:
340
+ """
341
+ The Key Vault key to use for encryption and decryption
342
+ """
343
+ return pulumi.get(self, "key_name")
344
+
345
+ @_builtins.property
346
+ @pulumi.getter(name="keyType")
347
+ def key_type(self) -> _builtins.str:
348
+ """
349
+ The type of key to use
350
+ """
351
+ return pulumi.get(self, "key_type")
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def name(self) -> _builtins.str:
356
+ """
357
+ A unique lowercase name that serves as identifying the key
358
+ """
359
+ return pulumi.get(self, "name")
360
+
361
+ @_builtins.property
362
+ @pulumi.getter(name="tenantId")
363
+ def tenant_id(self) -> _builtins.str:
364
+ """
365
+ The tenant id for the Azure Active Directory organization
366
+ """
367
+ return pulumi.get(self, "tenant_id")
368
+
369
+ @_builtins.property
370
+ @pulumi.getter(name="vaultName")
371
+ def vault_name(self) -> _builtins.str:
372
+ """
373
+ The Key Vault vault to use the encryption keys for encryption and decryption
374
+ """
375
+ return pulumi.get(self, "vault_name")
376
+
377
+ @_builtins.property
378
+ @pulumi.getter(name="allowGenerateKey")
379
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
380
+ """
381
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
382
+ """
383
+ return pulumi.get(self, "allow_generate_key")
384
+
385
+ @_builtins.property
386
+ @pulumi.getter(name="allowReplaceKey")
387
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
388
+ """
389
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
390
+ """
391
+ return pulumi.get(self, "allow_replace_key")
392
+
393
+ @_builtins.property
394
+ @pulumi.getter(name="allowStoreKey")
395
+ def allow_store_key(self) -> Optional[_builtins.bool]:
396
+ """
397
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
398
+ """
399
+ return pulumi.get(self, "allow_store_key")
400
+
401
+ @_builtins.property
402
+ @pulumi.getter(name="anyMount")
403
+ def any_mount(self) -> Optional[_builtins.bool]:
404
+ """
405
+ Allow usage from any mount point within the namespace if 'true'
406
+ """
407
+ return pulumi.get(self, "any_mount")
408
+
409
+ @_builtins.property
410
+ @pulumi.getter
411
+ def environment(self) -> Optional[_builtins.str]:
412
+ """
413
+ The Azure Cloud environment API endpoints to use
414
+ """
415
+ return pulumi.get(self, "environment")
416
+
417
+ @_builtins.property
418
+ @pulumi.getter(name="keyBits")
419
+ def key_bits(self) -> Optional[_builtins.str]:
420
+ """
421
+ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
422
+ """
423
+ return pulumi.get(self, "key_bits")
424
+
425
+ @_builtins.property
426
+ @pulumi.getter
427
+ def resource(self) -> Optional[_builtins.str]:
428
+ """
429
+ The Azure Key Vault resource's DNS Suffix to connect to
430
+ """
431
+ return pulumi.get(self, "resource")
432
+
433
+ @_builtins.property
434
+ @pulumi.getter
435
+ def uuid(self) -> Optional[_builtins.str]:
436
+ """
437
+ ID of the managed key read from Vault
438
+ """
439
+ return pulumi.get(self, "uuid")
440
+
441
+
442
+ @pulumi.output_type
443
+ class KeysPkc(dict):
444
+ @staticmethod
445
+ def __key_warning(key: str):
446
+ suggest = None
447
+ if key == "keyId":
448
+ suggest = "key_id"
449
+ elif key == "keyLabel":
450
+ suggest = "key_label"
451
+ elif key == "allowGenerateKey":
452
+ suggest = "allow_generate_key"
453
+ elif key == "allowReplaceKey":
454
+ suggest = "allow_replace_key"
455
+ elif key == "allowStoreKey":
456
+ suggest = "allow_store_key"
457
+ elif key == "anyMount":
458
+ suggest = "any_mount"
459
+ elif key == "forceRwSession":
460
+ suggest = "force_rw_session"
461
+ elif key == "keyBits":
462
+ suggest = "key_bits"
463
+ elif key == "tokenLabel":
464
+ suggest = "token_label"
465
+
466
+ if suggest:
467
+ pulumi.log.warn(f"Key '{key}' not found in KeysPkc. Access the value via the '{suggest}' property getter instead.")
468
+
469
+ def __getitem__(self, key: str) -> Any:
470
+ KeysPkc.__key_warning(key)
471
+ return super().__getitem__(key)
472
+
473
+ def get(self, key: str, default = None) -> Any:
474
+ KeysPkc.__key_warning(key)
475
+ return super().get(key, default)
476
+
477
+ def __init__(__self__, *,
478
+ key_id: _builtins.str,
479
+ key_label: _builtins.str,
480
+ library: _builtins.str,
481
+ mechanism: _builtins.str,
482
+ name: _builtins.str,
483
+ pin: _builtins.str,
484
+ allow_generate_key: Optional[_builtins.bool] = None,
485
+ allow_replace_key: Optional[_builtins.bool] = None,
486
+ allow_store_key: Optional[_builtins.bool] = None,
487
+ any_mount: Optional[_builtins.bool] = None,
488
+ curve: Optional[_builtins.str] = None,
489
+ force_rw_session: Optional[_builtins.str] = None,
490
+ key_bits: Optional[_builtins.str] = None,
491
+ slot: Optional[_builtins.str] = None,
492
+ token_label: Optional[_builtins.str] = None,
493
+ uuid: Optional[_builtins.str] = None):
494
+ """
495
+ :param _builtins.str key_id: The id of a PKCS#11 key to use
496
+ :param _builtins.str key_label: The label of the key to use
497
+ :param _builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
498
+ :param _builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
499
+ :param _builtins.str name: A unique lowercase name that serves as identifying the key
500
+ :param _builtins.str pin: The PIN for login
501
+ :param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
502
+ :param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
503
+ :param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
504
+ :param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
505
+ :param _builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
506
+ :param _builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
507
+ :param _builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
508
+ :param _builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
509
+ :param _builtins.str token_label: The slot token label to use
510
+ :param _builtins.str uuid: ID of the managed key read from Vault
511
+ """
512
+ pulumi.set(__self__, "key_id", key_id)
513
+ pulumi.set(__self__, "key_label", key_label)
514
+ pulumi.set(__self__, "library", library)
515
+ pulumi.set(__self__, "mechanism", mechanism)
516
+ pulumi.set(__self__, "name", name)
517
+ pulumi.set(__self__, "pin", pin)
518
+ if allow_generate_key is not None:
519
+ pulumi.set(__self__, "allow_generate_key", allow_generate_key)
520
+ if allow_replace_key is not None:
521
+ pulumi.set(__self__, "allow_replace_key", allow_replace_key)
522
+ if allow_store_key is not None:
523
+ pulumi.set(__self__, "allow_store_key", allow_store_key)
524
+ if any_mount is not None:
525
+ pulumi.set(__self__, "any_mount", any_mount)
526
+ if curve is not None:
527
+ pulumi.set(__self__, "curve", curve)
528
+ if force_rw_session is not None:
529
+ pulumi.set(__self__, "force_rw_session", force_rw_session)
530
+ if key_bits is not None:
531
+ pulumi.set(__self__, "key_bits", key_bits)
532
+ if slot is not None:
533
+ pulumi.set(__self__, "slot", slot)
534
+ if token_label is not None:
535
+ pulumi.set(__self__, "token_label", token_label)
536
+ if uuid is not None:
537
+ pulumi.set(__self__, "uuid", uuid)
538
+
539
+ @_builtins.property
540
+ @pulumi.getter(name="keyId")
541
+ def key_id(self) -> _builtins.str:
542
+ """
543
+ The id of a PKCS#11 key to use
544
+ """
545
+ return pulumi.get(self, "key_id")
546
+
547
+ @_builtins.property
548
+ @pulumi.getter(name="keyLabel")
549
+ def key_label(self) -> _builtins.str:
550
+ """
551
+ The label of the key to use
552
+ """
553
+ return pulumi.get(self, "key_label")
554
+
555
+ @_builtins.property
556
+ @pulumi.getter
557
+ def library(self) -> _builtins.str:
558
+ """
559
+ The name of the kms_library stanza to use from Vault's config to lookup the local library path
560
+ """
561
+ return pulumi.get(self, "library")
562
+
563
+ @_builtins.property
564
+ @pulumi.getter
565
+ def mechanism(self) -> _builtins.str:
566
+ """
567
+ The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
568
+ """
569
+ return pulumi.get(self, "mechanism")
570
+
571
+ @_builtins.property
572
+ @pulumi.getter
573
+ def name(self) -> _builtins.str:
574
+ """
575
+ A unique lowercase name that serves as identifying the key
576
+ """
577
+ return pulumi.get(self, "name")
578
+
579
+ @_builtins.property
580
+ @pulumi.getter
581
+ def pin(self) -> _builtins.str:
582
+ """
583
+ The PIN for login
584
+ """
585
+ return pulumi.get(self, "pin")
586
+
587
+ @_builtins.property
588
+ @pulumi.getter(name="allowGenerateKey")
589
+ def allow_generate_key(self) -> Optional[_builtins.bool]:
590
+ """
591
+ If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
592
+ """
593
+ return pulumi.get(self, "allow_generate_key")
594
+
595
+ @_builtins.property
596
+ @pulumi.getter(name="allowReplaceKey")
597
+ def allow_replace_key(self) -> Optional[_builtins.bool]:
598
+ """
599
+ Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
600
+ """
601
+ return pulumi.get(self, "allow_replace_key")
602
+
603
+ @_builtins.property
604
+ @pulumi.getter(name="allowStoreKey")
605
+ def allow_store_key(self) -> Optional[_builtins.bool]:
606
+ """
607
+ Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
608
+ """
609
+ return pulumi.get(self, "allow_store_key")
610
+
611
+ @_builtins.property
612
+ @pulumi.getter(name="anyMount")
613
+ def any_mount(self) -> Optional[_builtins.bool]:
614
+ """
615
+ Allow usage from any mount point within the namespace if 'true'
616
+ """
617
+ return pulumi.get(self, "any_mount")
618
+
619
+ @_builtins.property
620
+ @pulumi.getter
621
+ def curve(self) -> Optional[_builtins.str]:
622
+ """
623
+ Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
624
+ """
625
+ return pulumi.get(self, "curve")
626
+
627
+ @_builtins.property
628
+ @pulumi.getter(name="forceRwSession")
629
+ def force_rw_session(self) -> Optional[_builtins.str]:
630
+ """
631
+ Force all operations to open up a read-write session to the HSM
632
+ """
633
+ return pulumi.get(self, "force_rw_session")
634
+
635
+ @_builtins.property
636
+ @pulumi.getter(name="keyBits")
637
+ def key_bits(self) -> Optional[_builtins.str]:
638
+ """
639
+ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
640
+ """
641
+ return pulumi.get(self, "key_bits")
642
+
643
+ @_builtins.property
644
+ @pulumi.getter
645
+ def slot(self) -> Optional[_builtins.str]:
646
+ """
647
+ The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
648
+ """
649
+ return pulumi.get(self, "slot")
650
+
651
+ @_builtins.property
652
+ @pulumi.getter(name="tokenLabel")
653
+ def token_label(self) -> Optional[_builtins.str]:
654
+ """
655
+ The slot token label to use
656
+ """
657
+ return pulumi.get(self, "token_label")
658
+
659
+ @_builtins.property
660
+ @pulumi.getter
661
+ def uuid(self) -> Optional[_builtins.str]:
662
+ """
663
+ ID of the managed key read from Vault
664
+ """
665
+ return pulumi.get(self, "uuid")
666
+
667
+