pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,667 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'KeysAw',
|
|
19
|
+
'KeysAzure',
|
|
20
|
+
'KeysPkc',
|
|
21
|
+
]
|
|
22
|
+
|
|
23
|
+
@pulumi.output_type
|
|
24
|
+
class KeysAw(dict):
|
|
25
|
+
@staticmethod
|
|
26
|
+
def __key_warning(key: str):
|
|
27
|
+
suggest = None
|
|
28
|
+
if key == "accessKey":
|
|
29
|
+
suggest = "access_key"
|
|
30
|
+
elif key == "keyBits":
|
|
31
|
+
suggest = "key_bits"
|
|
32
|
+
elif key == "keyType":
|
|
33
|
+
suggest = "key_type"
|
|
34
|
+
elif key == "kmsKey":
|
|
35
|
+
suggest = "kms_key"
|
|
36
|
+
elif key == "secretKey":
|
|
37
|
+
suggest = "secret_key"
|
|
38
|
+
elif key == "allowGenerateKey":
|
|
39
|
+
suggest = "allow_generate_key"
|
|
40
|
+
elif key == "allowReplaceKey":
|
|
41
|
+
suggest = "allow_replace_key"
|
|
42
|
+
elif key == "allowStoreKey":
|
|
43
|
+
suggest = "allow_store_key"
|
|
44
|
+
elif key == "anyMount":
|
|
45
|
+
suggest = "any_mount"
|
|
46
|
+
|
|
47
|
+
if suggest:
|
|
48
|
+
pulumi.log.warn(f"Key '{key}' not found in KeysAw. Access the value via the '{suggest}' property getter instead.")
|
|
49
|
+
|
|
50
|
+
def __getitem__(self, key: str) -> Any:
|
|
51
|
+
KeysAw.__key_warning(key)
|
|
52
|
+
return super().__getitem__(key)
|
|
53
|
+
|
|
54
|
+
def get(self, key: str, default = None) -> Any:
|
|
55
|
+
KeysAw.__key_warning(key)
|
|
56
|
+
return super().get(key, default)
|
|
57
|
+
|
|
58
|
+
def __init__(__self__, *,
|
|
59
|
+
access_key: _builtins.str,
|
|
60
|
+
key_bits: _builtins.str,
|
|
61
|
+
key_type: _builtins.str,
|
|
62
|
+
kms_key: _builtins.str,
|
|
63
|
+
name: _builtins.str,
|
|
64
|
+
secret_key: _builtins.str,
|
|
65
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
|
66
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
|
67
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
|
68
|
+
any_mount: Optional[_builtins.bool] = None,
|
|
69
|
+
curve: Optional[_builtins.str] = None,
|
|
70
|
+
endpoint: Optional[_builtins.str] = None,
|
|
71
|
+
region: Optional[_builtins.str] = None,
|
|
72
|
+
uuid: Optional[_builtins.str] = None):
|
|
73
|
+
"""
|
|
74
|
+
:param _builtins.str access_key: The AWS access key to use
|
|
75
|
+
:param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
|
76
|
+
:param _builtins.str key_type: The type of key to use
|
|
77
|
+
:param _builtins.str kms_key: An identifier for the key
|
|
78
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
|
79
|
+
:param _builtins.str secret_key: The AWS secret key to use
|
|
80
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
81
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
82
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
83
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
84
|
+
:param _builtins.str curve: The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
|
85
|
+
:param _builtins.str endpoint: Used to specify a custom AWS endpoint
|
|
86
|
+
:param _builtins.str region: The AWS region where the keys are stored (or will be stored)
|
|
87
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
|
88
|
+
"""
|
|
89
|
+
pulumi.set(__self__, "access_key", access_key)
|
|
90
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
91
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
92
|
+
pulumi.set(__self__, "kms_key", kms_key)
|
|
93
|
+
pulumi.set(__self__, "name", name)
|
|
94
|
+
pulumi.set(__self__, "secret_key", secret_key)
|
|
95
|
+
if allow_generate_key is not None:
|
|
96
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
97
|
+
if allow_replace_key is not None:
|
|
98
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
99
|
+
if allow_store_key is not None:
|
|
100
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
101
|
+
if any_mount is not None:
|
|
102
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
103
|
+
if curve is not None:
|
|
104
|
+
pulumi.set(__self__, "curve", curve)
|
|
105
|
+
if endpoint is not None:
|
|
106
|
+
pulumi.set(__self__, "endpoint", endpoint)
|
|
107
|
+
if region is not None:
|
|
108
|
+
pulumi.set(__self__, "region", region)
|
|
109
|
+
if uuid is not None:
|
|
110
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
111
|
+
|
|
112
|
+
@_builtins.property
|
|
113
|
+
@pulumi.getter(name="accessKey")
|
|
114
|
+
def access_key(self) -> _builtins.str:
|
|
115
|
+
"""
|
|
116
|
+
The AWS access key to use
|
|
117
|
+
"""
|
|
118
|
+
return pulumi.get(self, "access_key")
|
|
119
|
+
|
|
120
|
+
@_builtins.property
|
|
121
|
+
@pulumi.getter(name="keyBits")
|
|
122
|
+
def key_bits(self) -> _builtins.str:
|
|
123
|
+
"""
|
|
124
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'
|
|
125
|
+
"""
|
|
126
|
+
return pulumi.get(self, "key_bits")
|
|
127
|
+
|
|
128
|
+
@_builtins.property
|
|
129
|
+
@pulumi.getter(name="keyType")
|
|
130
|
+
def key_type(self) -> _builtins.str:
|
|
131
|
+
"""
|
|
132
|
+
The type of key to use
|
|
133
|
+
"""
|
|
134
|
+
return pulumi.get(self, "key_type")
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter(name="kmsKey")
|
|
138
|
+
def kms_key(self) -> _builtins.str:
|
|
139
|
+
"""
|
|
140
|
+
An identifier for the key
|
|
141
|
+
"""
|
|
142
|
+
return pulumi.get(self, "kms_key")
|
|
143
|
+
|
|
144
|
+
@_builtins.property
|
|
145
|
+
@pulumi.getter
|
|
146
|
+
def name(self) -> _builtins.str:
|
|
147
|
+
"""
|
|
148
|
+
A unique lowercase name that serves as identifying the key
|
|
149
|
+
"""
|
|
150
|
+
return pulumi.get(self, "name")
|
|
151
|
+
|
|
152
|
+
@_builtins.property
|
|
153
|
+
@pulumi.getter(name="secretKey")
|
|
154
|
+
def secret_key(self) -> _builtins.str:
|
|
155
|
+
"""
|
|
156
|
+
The AWS secret key to use
|
|
157
|
+
"""
|
|
158
|
+
return pulumi.get(self, "secret_key")
|
|
159
|
+
|
|
160
|
+
@_builtins.property
|
|
161
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
162
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
|
163
|
+
"""
|
|
164
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
165
|
+
"""
|
|
166
|
+
return pulumi.get(self, "allow_generate_key")
|
|
167
|
+
|
|
168
|
+
@_builtins.property
|
|
169
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
170
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
|
171
|
+
"""
|
|
172
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
173
|
+
"""
|
|
174
|
+
return pulumi.get(self, "allow_replace_key")
|
|
175
|
+
|
|
176
|
+
@_builtins.property
|
|
177
|
+
@pulumi.getter(name="allowStoreKey")
|
|
178
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
|
179
|
+
"""
|
|
180
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "allow_store_key")
|
|
183
|
+
|
|
184
|
+
@_builtins.property
|
|
185
|
+
@pulumi.getter(name="anyMount")
|
|
186
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
|
187
|
+
"""
|
|
188
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
189
|
+
"""
|
|
190
|
+
return pulumi.get(self, "any_mount")
|
|
191
|
+
|
|
192
|
+
@_builtins.property
|
|
193
|
+
@pulumi.getter
|
|
194
|
+
def curve(self) -> Optional[_builtins.str]:
|
|
195
|
+
"""
|
|
196
|
+
The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true
|
|
197
|
+
"""
|
|
198
|
+
return pulumi.get(self, "curve")
|
|
199
|
+
|
|
200
|
+
@_builtins.property
|
|
201
|
+
@pulumi.getter
|
|
202
|
+
def endpoint(self) -> Optional[_builtins.str]:
|
|
203
|
+
"""
|
|
204
|
+
Used to specify a custom AWS endpoint
|
|
205
|
+
"""
|
|
206
|
+
return pulumi.get(self, "endpoint")
|
|
207
|
+
|
|
208
|
+
@_builtins.property
|
|
209
|
+
@pulumi.getter
|
|
210
|
+
def region(self) -> Optional[_builtins.str]:
|
|
211
|
+
"""
|
|
212
|
+
The AWS region where the keys are stored (or will be stored)
|
|
213
|
+
"""
|
|
214
|
+
return pulumi.get(self, "region")
|
|
215
|
+
|
|
216
|
+
@_builtins.property
|
|
217
|
+
@pulumi.getter
|
|
218
|
+
def uuid(self) -> Optional[_builtins.str]:
|
|
219
|
+
"""
|
|
220
|
+
ID of the managed key read from Vault
|
|
221
|
+
"""
|
|
222
|
+
return pulumi.get(self, "uuid")
|
|
223
|
+
|
|
224
|
+
|
|
225
|
+
@pulumi.output_type
|
|
226
|
+
class KeysAzure(dict):
|
|
227
|
+
@staticmethod
|
|
228
|
+
def __key_warning(key: str):
|
|
229
|
+
suggest = None
|
|
230
|
+
if key == "clientId":
|
|
231
|
+
suggest = "client_id"
|
|
232
|
+
elif key == "clientSecret":
|
|
233
|
+
suggest = "client_secret"
|
|
234
|
+
elif key == "keyName":
|
|
235
|
+
suggest = "key_name"
|
|
236
|
+
elif key == "keyType":
|
|
237
|
+
suggest = "key_type"
|
|
238
|
+
elif key == "tenantId":
|
|
239
|
+
suggest = "tenant_id"
|
|
240
|
+
elif key == "vaultName":
|
|
241
|
+
suggest = "vault_name"
|
|
242
|
+
elif key == "allowGenerateKey":
|
|
243
|
+
suggest = "allow_generate_key"
|
|
244
|
+
elif key == "allowReplaceKey":
|
|
245
|
+
suggest = "allow_replace_key"
|
|
246
|
+
elif key == "allowStoreKey":
|
|
247
|
+
suggest = "allow_store_key"
|
|
248
|
+
elif key == "anyMount":
|
|
249
|
+
suggest = "any_mount"
|
|
250
|
+
elif key == "keyBits":
|
|
251
|
+
suggest = "key_bits"
|
|
252
|
+
|
|
253
|
+
if suggest:
|
|
254
|
+
pulumi.log.warn(f"Key '{key}' not found in KeysAzure. Access the value via the '{suggest}' property getter instead.")
|
|
255
|
+
|
|
256
|
+
def __getitem__(self, key: str) -> Any:
|
|
257
|
+
KeysAzure.__key_warning(key)
|
|
258
|
+
return super().__getitem__(key)
|
|
259
|
+
|
|
260
|
+
def get(self, key: str, default = None) -> Any:
|
|
261
|
+
KeysAzure.__key_warning(key)
|
|
262
|
+
return super().get(key, default)
|
|
263
|
+
|
|
264
|
+
def __init__(__self__, *,
|
|
265
|
+
client_id: _builtins.str,
|
|
266
|
+
client_secret: _builtins.str,
|
|
267
|
+
key_name: _builtins.str,
|
|
268
|
+
key_type: _builtins.str,
|
|
269
|
+
name: _builtins.str,
|
|
270
|
+
tenant_id: _builtins.str,
|
|
271
|
+
vault_name: _builtins.str,
|
|
272
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
|
273
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
|
274
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
|
275
|
+
any_mount: Optional[_builtins.bool] = None,
|
|
276
|
+
environment: Optional[_builtins.str] = None,
|
|
277
|
+
key_bits: Optional[_builtins.str] = None,
|
|
278
|
+
resource: Optional[_builtins.str] = None,
|
|
279
|
+
uuid: Optional[_builtins.str] = None):
|
|
280
|
+
"""
|
|
281
|
+
:param _builtins.str client_id: The client id for credentials to query the Azure APIs
|
|
282
|
+
:param _builtins.str client_secret: The client secret for credentials to query the Azure APIs
|
|
283
|
+
:param _builtins.str key_name: The Key Vault key to use for encryption and decryption
|
|
284
|
+
:param _builtins.str key_type: The type of key to use
|
|
285
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
|
286
|
+
:param _builtins.str tenant_id: The tenant id for the Azure Active Directory organization
|
|
287
|
+
:param _builtins.str vault_name: The Key Vault vault to use the encryption keys for encryption and decryption
|
|
288
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
289
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
290
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
291
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
292
|
+
:param _builtins.str environment: The Azure Cloud environment API endpoints to use
|
|
293
|
+
:param _builtins.str key_bits: The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
|
294
|
+
:param _builtins.str resource: The Azure Key Vault resource's DNS Suffix to connect to
|
|
295
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
|
296
|
+
"""
|
|
297
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
298
|
+
pulumi.set(__self__, "client_secret", client_secret)
|
|
299
|
+
pulumi.set(__self__, "key_name", key_name)
|
|
300
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
301
|
+
pulumi.set(__self__, "name", name)
|
|
302
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
303
|
+
pulumi.set(__self__, "vault_name", vault_name)
|
|
304
|
+
if allow_generate_key is not None:
|
|
305
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
306
|
+
if allow_replace_key is not None:
|
|
307
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
308
|
+
if allow_store_key is not None:
|
|
309
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
310
|
+
if any_mount is not None:
|
|
311
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
312
|
+
if environment is not None:
|
|
313
|
+
pulumi.set(__self__, "environment", environment)
|
|
314
|
+
if key_bits is not None:
|
|
315
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
316
|
+
if resource is not None:
|
|
317
|
+
pulumi.set(__self__, "resource", resource)
|
|
318
|
+
if uuid is not None:
|
|
319
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
320
|
+
|
|
321
|
+
@_builtins.property
|
|
322
|
+
@pulumi.getter(name="clientId")
|
|
323
|
+
def client_id(self) -> _builtins.str:
|
|
324
|
+
"""
|
|
325
|
+
The client id for credentials to query the Azure APIs
|
|
326
|
+
"""
|
|
327
|
+
return pulumi.get(self, "client_id")
|
|
328
|
+
|
|
329
|
+
@_builtins.property
|
|
330
|
+
@pulumi.getter(name="clientSecret")
|
|
331
|
+
def client_secret(self) -> _builtins.str:
|
|
332
|
+
"""
|
|
333
|
+
The client secret for credentials to query the Azure APIs
|
|
334
|
+
"""
|
|
335
|
+
return pulumi.get(self, "client_secret")
|
|
336
|
+
|
|
337
|
+
@_builtins.property
|
|
338
|
+
@pulumi.getter(name="keyName")
|
|
339
|
+
def key_name(self) -> _builtins.str:
|
|
340
|
+
"""
|
|
341
|
+
The Key Vault key to use for encryption and decryption
|
|
342
|
+
"""
|
|
343
|
+
return pulumi.get(self, "key_name")
|
|
344
|
+
|
|
345
|
+
@_builtins.property
|
|
346
|
+
@pulumi.getter(name="keyType")
|
|
347
|
+
def key_type(self) -> _builtins.str:
|
|
348
|
+
"""
|
|
349
|
+
The type of key to use
|
|
350
|
+
"""
|
|
351
|
+
return pulumi.get(self, "key_type")
|
|
352
|
+
|
|
353
|
+
@_builtins.property
|
|
354
|
+
@pulumi.getter
|
|
355
|
+
def name(self) -> _builtins.str:
|
|
356
|
+
"""
|
|
357
|
+
A unique lowercase name that serves as identifying the key
|
|
358
|
+
"""
|
|
359
|
+
return pulumi.get(self, "name")
|
|
360
|
+
|
|
361
|
+
@_builtins.property
|
|
362
|
+
@pulumi.getter(name="tenantId")
|
|
363
|
+
def tenant_id(self) -> _builtins.str:
|
|
364
|
+
"""
|
|
365
|
+
The tenant id for the Azure Active Directory organization
|
|
366
|
+
"""
|
|
367
|
+
return pulumi.get(self, "tenant_id")
|
|
368
|
+
|
|
369
|
+
@_builtins.property
|
|
370
|
+
@pulumi.getter(name="vaultName")
|
|
371
|
+
def vault_name(self) -> _builtins.str:
|
|
372
|
+
"""
|
|
373
|
+
The Key Vault vault to use the encryption keys for encryption and decryption
|
|
374
|
+
"""
|
|
375
|
+
return pulumi.get(self, "vault_name")
|
|
376
|
+
|
|
377
|
+
@_builtins.property
|
|
378
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
379
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
|
380
|
+
"""
|
|
381
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
382
|
+
"""
|
|
383
|
+
return pulumi.get(self, "allow_generate_key")
|
|
384
|
+
|
|
385
|
+
@_builtins.property
|
|
386
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
387
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
|
388
|
+
"""
|
|
389
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
390
|
+
"""
|
|
391
|
+
return pulumi.get(self, "allow_replace_key")
|
|
392
|
+
|
|
393
|
+
@_builtins.property
|
|
394
|
+
@pulumi.getter(name="allowStoreKey")
|
|
395
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
|
396
|
+
"""
|
|
397
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
398
|
+
"""
|
|
399
|
+
return pulumi.get(self, "allow_store_key")
|
|
400
|
+
|
|
401
|
+
@_builtins.property
|
|
402
|
+
@pulumi.getter(name="anyMount")
|
|
403
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
|
404
|
+
"""
|
|
405
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
406
|
+
"""
|
|
407
|
+
return pulumi.get(self, "any_mount")
|
|
408
|
+
|
|
409
|
+
@_builtins.property
|
|
410
|
+
@pulumi.getter
|
|
411
|
+
def environment(self) -> Optional[_builtins.str]:
|
|
412
|
+
"""
|
|
413
|
+
The Azure Cloud environment API endpoints to use
|
|
414
|
+
"""
|
|
415
|
+
return pulumi.get(self, "environment")
|
|
416
|
+
|
|
417
|
+
@_builtins.property
|
|
418
|
+
@pulumi.getter(name="keyBits")
|
|
419
|
+
def key_bits(self) -> Optional[_builtins.str]:
|
|
420
|
+
"""
|
|
421
|
+
The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true
|
|
422
|
+
"""
|
|
423
|
+
return pulumi.get(self, "key_bits")
|
|
424
|
+
|
|
425
|
+
@_builtins.property
|
|
426
|
+
@pulumi.getter
|
|
427
|
+
def resource(self) -> Optional[_builtins.str]:
|
|
428
|
+
"""
|
|
429
|
+
The Azure Key Vault resource's DNS Suffix to connect to
|
|
430
|
+
"""
|
|
431
|
+
return pulumi.get(self, "resource")
|
|
432
|
+
|
|
433
|
+
@_builtins.property
|
|
434
|
+
@pulumi.getter
|
|
435
|
+
def uuid(self) -> Optional[_builtins.str]:
|
|
436
|
+
"""
|
|
437
|
+
ID of the managed key read from Vault
|
|
438
|
+
"""
|
|
439
|
+
return pulumi.get(self, "uuid")
|
|
440
|
+
|
|
441
|
+
|
|
442
|
+
@pulumi.output_type
|
|
443
|
+
class KeysPkc(dict):
|
|
444
|
+
@staticmethod
|
|
445
|
+
def __key_warning(key: str):
|
|
446
|
+
suggest = None
|
|
447
|
+
if key == "keyId":
|
|
448
|
+
suggest = "key_id"
|
|
449
|
+
elif key == "keyLabel":
|
|
450
|
+
suggest = "key_label"
|
|
451
|
+
elif key == "allowGenerateKey":
|
|
452
|
+
suggest = "allow_generate_key"
|
|
453
|
+
elif key == "allowReplaceKey":
|
|
454
|
+
suggest = "allow_replace_key"
|
|
455
|
+
elif key == "allowStoreKey":
|
|
456
|
+
suggest = "allow_store_key"
|
|
457
|
+
elif key == "anyMount":
|
|
458
|
+
suggest = "any_mount"
|
|
459
|
+
elif key == "forceRwSession":
|
|
460
|
+
suggest = "force_rw_session"
|
|
461
|
+
elif key == "keyBits":
|
|
462
|
+
suggest = "key_bits"
|
|
463
|
+
elif key == "tokenLabel":
|
|
464
|
+
suggest = "token_label"
|
|
465
|
+
|
|
466
|
+
if suggest:
|
|
467
|
+
pulumi.log.warn(f"Key '{key}' not found in KeysPkc. Access the value via the '{suggest}' property getter instead.")
|
|
468
|
+
|
|
469
|
+
def __getitem__(self, key: str) -> Any:
|
|
470
|
+
KeysPkc.__key_warning(key)
|
|
471
|
+
return super().__getitem__(key)
|
|
472
|
+
|
|
473
|
+
def get(self, key: str, default = None) -> Any:
|
|
474
|
+
KeysPkc.__key_warning(key)
|
|
475
|
+
return super().get(key, default)
|
|
476
|
+
|
|
477
|
+
def __init__(__self__, *,
|
|
478
|
+
key_id: _builtins.str,
|
|
479
|
+
key_label: _builtins.str,
|
|
480
|
+
library: _builtins.str,
|
|
481
|
+
mechanism: _builtins.str,
|
|
482
|
+
name: _builtins.str,
|
|
483
|
+
pin: _builtins.str,
|
|
484
|
+
allow_generate_key: Optional[_builtins.bool] = None,
|
|
485
|
+
allow_replace_key: Optional[_builtins.bool] = None,
|
|
486
|
+
allow_store_key: Optional[_builtins.bool] = None,
|
|
487
|
+
any_mount: Optional[_builtins.bool] = None,
|
|
488
|
+
curve: Optional[_builtins.str] = None,
|
|
489
|
+
force_rw_session: Optional[_builtins.str] = None,
|
|
490
|
+
key_bits: Optional[_builtins.str] = None,
|
|
491
|
+
slot: Optional[_builtins.str] = None,
|
|
492
|
+
token_label: Optional[_builtins.str] = None,
|
|
493
|
+
uuid: Optional[_builtins.str] = None):
|
|
494
|
+
"""
|
|
495
|
+
:param _builtins.str key_id: The id of a PKCS#11 key to use
|
|
496
|
+
:param _builtins.str key_label: The label of the key to use
|
|
497
|
+
:param _builtins.str library: The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
|
498
|
+
:param _builtins.str mechanism: The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
|
499
|
+
:param _builtins.str name: A unique lowercase name that serves as identifying the key
|
|
500
|
+
:param _builtins.str pin: The PIN for login
|
|
501
|
+
:param _builtins.bool allow_generate_key: If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
502
|
+
:param _builtins.bool allow_replace_key: Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
503
|
+
:param _builtins.bool allow_store_key: Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
504
|
+
:param _builtins.bool any_mount: Allow usage from any mount point within the namespace if 'true'
|
|
505
|
+
:param _builtins.str curve: Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
|
506
|
+
:param _builtins.str force_rw_session: Force all operations to open up a read-write session to the HSM
|
|
507
|
+
:param _builtins.str key_bits: Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
|
508
|
+
:param _builtins.str slot: The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
|
509
|
+
:param _builtins.str token_label: The slot token label to use
|
|
510
|
+
:param _builtins.str uuid: ID of the managed key read from Vault
|
|
511
|
+
"""
|
|
512
|
+
pulumi.set(__self__, "key_id", key_id)
|
|
513
|
+
pulumi.set(__self__, "key_label", key_label)
|
|
514
|
+
pulumi.set(__self__, "library", library)
|
|
515
|
+
pulumi.set(__self__, "mechanism", mechanism)
|
|
516
|
+
pulumi.set(__self__, "name", name)
|
|
517
|
+
pulumi.set(__self__, "pin", pin)
|
|
518
|
+
if allow_generate_key is not None:
|
|
519
|
+
pulumi.set(__self__, "allow_generate_key", allow_generate_key)
|
|
520
|
+
if allow_replace_key is not None:
|
|
521
|
+
pulumi.set(__self__, "allow_replace_key", allow_replace_key)
|
|
522
|
+
if allow_store_key is not None:
|
|
523
|
+
pulumi.set(__self__, "allow_store_key", allow_store_key)
|
|
524
|
+
if any_mount is not None:
|
|
525
|
+
pulumi.set(__self__, "any_mount", any_mount)
|
|
526
|
+
if curve is not None:
|
|
527
|
+
pulumi.set(__self__, "curve", curve)
|
|
528
|
+
if force_rw_session is not None:
|
|
529
|
+
pulumi.set(__self__, "force_rw_session", force_rw_session)
|
|
530
|
+
if key_bits is not None:
|
|
531
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
532
|
+
if slot is not None:
|
|
533
|
+
pulumi.set(__self__, "slot", slot)
|
|
534
|
+
if token_label is not None:
|
|
535
|
+
pulumi.set(__self__, "token_label", token_label)
|
|
536
|
+
if uuid is not None:
|
|
537
|
+
pulumi.set(__self__, "uuid", uuid)
|
|
538
|
+
|
|
539
|
+
@_builtins.property
|
|
540
|
+
@pulumi.getter(name="keyId")
|
|
541
|
+
def key_id(self) -> _builtins.str:
|
|
542
|
+
"""
|
|
543
|
+
The id of a PKCS#11 key to use
|
|
544
|
+
"""
|
|
545
|
+
return pulumi.get(self, "key_id")
|
|
546
|
+
|
|
547
|
+
@_builtins.property
|
|
548
|
+
@pulumi.getter(name="keyLabel")
|
|
549
|
+
def key_label(self) -> _builtins.str:
|
|
550
|
+
"""
|
|
551
|
+
The label of the key to use
|
|
552
|
+
"""
|
|
553
|
+
return pulumi.get(self, "key_label")
|
|
554
|
+
|
|
555
|
+
@_builtins.property
|
|
556
|
+
@pulumi.getter
|
|
557
|
+
def library(self) -> _builtins.str:
|
|
558
|
+
"""
|
|
559
|
+
The name of the kms_library stanza to use from Vault's config to lookup the local library path
|
|
560
|
+
"""
|
|
561
|
+
return pulumi.get(self, "library")
|
|
562
|
+
|
|
563
|
+
@_builtins.property
|
|
564
|
+
@pulumi.getter
|
|
565
|
+
def mechanism(self) -> _builtins.str:
|
|
566
|
+
"""
|
|
567
|
+
The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string.
|
|
568
|
+
"""
|
|
569
|
+
return pulumi.get(self, "mechanism")
|
|
570
|
+
|
|
571
|
+
@_builtins.property
|
|
572
|
+
@pulumi.getter
|
|
573
|
+
def name(self) -> _builtins.str:
|
|
574
|
+
"""
|
|
575
|
+
A unique lowercase name that serves as identifying the key
|
|
576
|
+
"""
|
|
577
|
+
return pulumi.get(self, "name")
|
|
578
|
+
|
|
579
|
+
@_builtins.property
|
|
580
|
+
@pulumi.getter
|
|
581
|
+
def pin(self) -> _builtins.str:
|
|
582
|
+
"""
|
|
583
|
+
The PIN for login
|
|
584
|
+
"""
|
|
585
|
+
return pulumi.get(self, "pin")
|
|
586
|
+
|
|
587
|
+
@_builtins.property
|
|
588
|
+
@pulumi.getter(name="allowGenerateKey")
|
|
589
|
+
def allow_generate_key(self) -> Optional[_builtins.bool]:
|
|
590
|
+
"""
|
|
591
|
+
If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend
|
|
592
|
+
"""
|
|
593
|
+
return pulumi.get(self, "allow_generate_key")
|
|
594
|
+
|
|
595
|
+
@_builtins.property
|
|
596
|
+
@pulumi.getter(name="allowReplaceKey")
|
|
597
|
+
def allow_replace_key(self) -> Optional[_builtins.bool]:
|
|
598
|
+
"""
|
|
599
|
+
Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists.
|
|
600
|
+
"""
|
|
601
|
+
return pulumi.get(self, "allow_replace_key")
|
|
602
|
+
|
|
603
|
+
@_builtins.property
|
|
604
|
+
@pulumi.getter(name="allowStoreKey")
|
|
605
|
+
def allow_store_key(self) -> Optional[_builtins.bool]:
|
|
606
|
+
"""
|
|
607
|
+
Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden
|
|
608
|
+
"""
|
|
609
|
+
return pulumi.get(self, "allow_store_key")
|
|
610
|
+
|
|
611
|
+
@_builtins.property
|
|
612
|
+
@pulumi.getter(name="anyMount")
|
|
613
|
+
def any_mount(self) -> Optional[_builtins.bool]:
|
|
614
|
+
"""
|
|
615
|
+
Allow usage from any mount point within the namespace if 'true'
|
|
616
|
+
"""
|
|
617
|
+
return pulumi.get(self, "any_mount")
|
|
618
|
+
|
|
619
|
+
@_builtins.property
|
|
620
|
+
@pulumi.getter
|
|
621
|
+
def curve(self) -> Optional[_builtins.str]:
|
|
622
|
+
"""
|
|
623
|
+
Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true
|
|
624
|
+
"""
|
|
625
|
+
return pulumi.get(self, "curve")
|
|
626
|
+
|
|
627
|
+
@_builtins.property
|
|
628
|
+
@pulumi.getter(name="forceRwSession")
|
|
629
|
+
def force_rw_session(self) -> Optional[_builtins.str]:
|
|
630
|
+
"""
|
|
631
|
+
Force all operations to open up a read-write session to the HSM
|
|
632
|
+
"""
|
|
633
|
+
return pulumi.get(self, "force_rw_session")
|
|
634
|
+
|
|
635
|
+
@_builtins.property
|
|
636
|
+
@pulumi.getter(name="keyBits")
|
|
637
|
+
def key_bits(self) -> Optional[_builtins.str]:
|
|
638
|
+
"""
|
|
639
|
+
Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKCS_OAEP' or 'CKM_RSA_PKCS' as a value for 'mechanism'. Required if 'allow_generate_key' is true
|
|
640
|
+
"""
|
|
641
|
+
return pulumi.get(self, "key_bits")
|
|
642
|
+
|
|
643
|
+
@_builtins.property
|
|
644
|
+
@pulumi.getter
|
|
645
|
+
def slot(self) -> Optional[_builtins.str]:
|
|
646
|
+
"""
|
|
647
|
+
The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953')
|
|
648
|
+
"""
|
|
649
|
+
return pulumi.get(self, "slot")
|
|
650
|
+
|
|
651
|
+
@_builtins.property
|
|
652
|
+
@pulumi.getter(name="tokenLabel")
|
|
653
|
+
def token_label(self) -> Optional[_builtins.str]:
|
|
654
|
+
"""
|
|
655
|
+
The slot token label to use
|
|
656
|
+
"""
|
|
657
|
+
return pulumi.get(self, "token_label")
|
|
658
|
+
|
|
659
|
+
@_builtins.property
|
|
660
|
+
@pulumi.getter
|
|
661
|
+
def uuid(self) -> Optional[_builtins.str]:
|
|
662
|
+
"""
|
|
663
|
+
ID of the managed key read from Vault
|
|
664
|
+
"""
|
|
665
|
+
return pulumi.get(self, "uuid")
|
|
666
|
+
|
|
667
|
+
|