pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,209 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigCmpv2Result',
20
+ 'AwaitableGetBackendConfigCmpv2Result',
21
+ 'get_backend_config_cmpv2',
22
+ 'get_backend_config_cmpv2_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigCmpv2Result:
27
+ """
28
+ A collection of values returned by getBackendConfigCmpv2.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_path_policy and not isinstance(default_path_policy, str):
41
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
42
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
43
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
44
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
45
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
46
+ if enabled and not isinstance(enabled, bool):
47
+ raise TypeError("Expected argument 'enabled' to be a bool")
48
+ pulumi.set(__self__, "enabled", enabled)
49
+ if id and not isinstance(id, str):
50
+ raise TypeError("Expected argument 'id' to be a str")
51
+ pulumi.set(__self__, "id", id)
52
+ if last_updated and not isinstance(last_updated, str):
53
+ raise TypeError("Expected argument 'last_updated' to be a str")
54
+ pulumi.set(__self__, "last_updated", last_updated)
55
+ if namespace and not isinstance(namespace, str):
56
+ raise TypeError("Expected argument 'namespace' to be a str")
57
+ pulumi.set(__self__, "namespace", namespace)
58
+
59
+ @property
60
+ @pulumi.getter(name="auditFields")
61
+ def audit_fields(self) -> Sequence[str]:
62
+ return pulumi.get(self, "audit_fields")
63
+
64
+ @property
65
+ @pulumi.getter
66
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
67
+ return pulumi.get(self, "authenticators")
68
+
69
+ @property
70
+ @pulumi.getter
71
+ def backend(self) -> str:
72
+ return pulumi.get(self, "backend")
73
+
74
+ @property
75
+ @pulumi.getter(name="defaultPathPolicy")
76
+ def default_path_policy(self) -> str:
77
+ return pulumi.get(self, "default_path_policy")
78
+
79
+ @property
80
+ @pulumi.getter(name="enableSentinelParsing")
81
+ def enable_sentinel_parsing(self) -> bool:
82
+ return pulumi.get(self, "enable_sentinel_parsing")
83
+
84
+ @property
85
+ @pulumi.getter
86
+ def enabled(self) -> bool:
87
+ return pulumi.get(self, "enabled")
88
+
89
+ @property
90
+ @pulumi.getter
91
+ def id(self) -> str:
92
+ """
93
+ The provider-assigned unique ID for this managed resource.
94
+ """
95
+ return pulumi.get(self, "id")
96
+
97
+ @property
98
+ @pulumi.getter(name="lastUpdated")
99
+ def last_updated(self) -> str:
100
+ return pulumi.get(self, "last_updated")
101
+
102
+ @property
103
+ @pulumi.getter
104
+ def namespace(self) -> Optional[str]:
105
+ return pulumi.get(self, "namespace")
106
+
107
+
108
+ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
109
+ # pylint: disable=using-constant-test
110
+ def __await__(self):
111
+ if False:
112
+ yield self
113
+ return GetBackendConfigCmpv2Result(
114
+ audit_fields=self.audit_fields,
115
+ authenticators=self.authenticators,
116
+ backend=self.backend,
117
+ default_path_policy=self.default_path_policy,
118
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
119
+ enabled=self.enabled,
120
+ id=self.id,
121
+ last_updated=self.last_updated,
122
+ namespace=self.namespace)
123
+
124
+
125
+ def get_backend_config_cmpv2(backend: Optional[str] = None,
126
+ namespace: Optional[str] = None,
127
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
128
+ """
129
+ ## Example Usage
130
+
131
+ ```python
132
+ import pulumi
133
+ import pulumi_vault as vault
134
+
135
+ pki = vault.Mount("pki",
136
+ path="pki",
137
+ type="pki",
138
+ description="PKI secret engine mount")
139
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
140
+ ```
141
+
142
+
143
+ :param str backend: The path to the PKI secret backend to
144
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
145
+
146
+ # Attributes Reference
147
+ :param str namespace: The namespace of the target resource.
148
+ The value should not contain leading or trailing forward slashes.
149
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
150
+ *Available only for Vault Enterprise*.
151
+ """
152
+ __args__ = dict()
153
+ __args__['backend'] = backend
154
+ __args__['namespace'] = namespace
155
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
156
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result).value
157
+
158
+ return AwaitableGetBackendConfigCmpv2Result(
159
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
160
+ authenticators=pulumi.get(__ret__, 'authenticators'),
161
+ backend=pulumi.get(__ret__, 'backend'),
162
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
163
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
164
+ enabled=pulumi.get(__ret__, 'enabled'),
165
+ id=pulumi.get(__ret__, 'id'),
166
+ last_updated=pulumi.get(__ret__, 'last_updated'),
167
+ namespace=pulumi.get(__ret__, 'namespace'))
168
+ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
169
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
171
+ """
172
+ ## Example Usage
173
+
174
+ ```python
175
+ import pulumi
176
+ import pulumi_vault as vault
177
+
178
+ pki = vault.Mount("pki",
179
+ path="pki",
180
+ type="pki",
181
+ description="PKI secret engine mount")
182
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
183
+ ```
184
+
185
+
186
+ :param str backend: The path to the PKI secret backend to
187
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
188
+
189
+ # Attributes Reference
190
+ :param str namespace: The namespace of the target resource.
191
+ The value should not contain leading or trailing forward slashes.
192
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
+ *Available only for Vault Enterprise*.
194
+ """
195
+ __args__ = dict()
196
+ __args__['backend'] = backend
197
+ __args__['namespace'] = namespace
198
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
199
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result)
200
+ return __ret__.apply(lambda __response__: GetBackendConfigCmpv2Result(
201
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
202
+ authenticators=pulumi.get(__response__, 'authenticators'),
203
+ backend=pulumi.get(__response__, 'backend'),
204
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
205
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
206
+ enabled=pulumi.get(__response__, 'enabled'),
207
+ id=pulumi.get(__response__, 'id'),
208
+ last_updated=pulumi.get(__response__, 'last_updated'),
209
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -0,0 +1,251 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigEstResult',
20
+ 'AwaitableGetBackendConfigEstResult',
21
+ 'get_backend_config_est',
22
+ 'get_backend_config_est_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigEstResult:
27
+ """
28
+ A collection of values returned by getBackendConfigEst.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_mount and not isinstance(default_mount, bool):
41
+ raise TypeError("Expected argument 'default_mount' to be a bool")
42
+ pulumi.set(__self__, "default_mount", default_mount)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if label_to_path_policy and not isinstance(label_to_path_policy, dict):
56
+ raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
57
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
58
+ if last_updated and not isinstance(last_updated, str):
59
+ raise TypeError("Expected argument 'last_updated' to be a str")
60
+ pulumi.set(__self__, "last_updated", last_updated)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @property
66
+ @pulumi.getter(name="auditFields")
67
+ def audit_fields(self) -> Sequence[str]:
68
+ """
69
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
+ """
71
+ return pulumi.get(self, "audit_fields")
72
+
73
+ @property
74
+ @pulumi.getter
75
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
76
+ """
77
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
78
+ """
79
+ return pulumi.get(self, "authenticators")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def backend(self) -> str:
84
+ return pulumi.get(self, "backend")
85
+
86
+ @property
87
+ @pulumi.getter(name="defaultMount")
88
+ def default_mount(self) -> bool:
89
+ """
90
+ If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
+ """
92
+ return pulumi.get(self, "default_mount")
93
+
94
+ @property
95
+ @pulumi.getter(name="defaultPathPolicy")
96
+ def default_path_policy(self) -> str:
97
+ """
98
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
+ """
100
+ return pulumi.get(self, "default_path_policy")
101
+
102
+ @property
103
+ @pulumi.getter(name="enableSentinelParsing")
104
+ def enable_sentinel_parsing(self) -> bool:
105
+ """
106
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
+ """
108
+ return pulumi.get(self, "enable_sentinel_parsing")
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def enabled(self) -> bool:
113
+ """
114
+ Specifies whether EST is enabled.
115
+ """
116
+ return pulumi.get(self, "enabled")
117
+
118
+ @property
119
+ @pulumi.getter
120
+ def id(self) -> str:
121
+ """
122
+ The provider-assigned unique ID for this managed resource.
123
+ """
124
+ return pulumi.get(self, "id")
125
+
126
+ @property
127
+ @pulumi.getter(name="labelToPathPolicy")
128
+ def label_to_path_policy(self) -> Mapping[str, str]:
129
+ """
130
+ A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
+ """
132
+ return pulumi.get(self, "label_to_path_policy")
133
+
134
+ @property
135
+ @pulumi.getter(name="lastUpdated")
136
+ def last_updated(self) -> str:
137
+ """
138
+ A read-only timestamp representing the last time the configuration was updated.
139
+ """
140
+ return pulumi.get(self, "last_updated")
141
+
142
+ @property
143
+ @pulumi.getter
144
+ def namespace(self) -> Optional[str]:
145
+ return pulumi.get(self, "namespace")
146
+
147
+
148
+ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
149
+ # pylint: disable=using-constant-test
150
+ def __await__(self):
151
+ if False:
152
+ yield self
153
+ return GetBackendConfigEstResult(
154
+ audit_fields=self.audit_fields,
155
+ authenticators=self.authenticators,
156
+ backend=self.backend,
157
+ default_mount=self.default_mount,
158
+ default_path_policy=self.default_path_policy,
159
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
160
+ enabled=self.enabled,
161
+ id=self.id,
162
+ label_to_path_policy=self.label_to_path_policy,
163
+ last_updated=self.last_updated,
164
+ namespace=self.namespace)
165
+
166
+
167
+ def get_backend_config_est(backend: Optional[str] = None,
168
+ namespace: Optional[str] = None,
169
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
+ """
171
+ ## Example Usage
172
+
173
+ ```python
174
+ import pulumi
175
+ import pulumi_vault as vault
176
+
177
+ pki = vault.Mount("pki",
178
+ path="pki",
179
+ type="pki",
180
+ description="PKI secret engine mount")
181
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
182
+ ```
183
+
184
+
185
+ :param str backend: The path to the PKI secret backend to
186
+ read the EST configuration from, with no leading or trailing `/`s.
187
+ :param str namespace: The namespace of the target resource.
188
+ The value should not contain leading or trailing forward slashes.
189
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
+ *Available only for Vault Enterprise*.
191
+ """
192
+ __args__ = dict()
193
+ __args__['backend'] = backend
194
+ __args__['namespace'] = namespace
195
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
196
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
197
+
198
+ return AwaitableGetBackendConfigEstResult(
199
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
200
+ authenticators=pulumi.get(__ret__, 'authenticators'),
201
+ backend=pulumi.get(__ret__, 'backend'),
202
+ default_mount=pulumi.get(__ret__, 'default_mount'),
203
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
204
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
205
+ enabled=pulumi.get(__ret__, 'enabled'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
+ last_updated=pulumi.get(__ret__, 'last_updated'),
209
+ namespace=pulumi.get(__ret__, 'namespace'))
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
225
+ ```
226
+
227
+
228
+ :param str backend: The path to the PKI secret backend to
229
+ read the EST configuration from, with no leading or trailing `/`s.
230
+ :param str namespace: The namespace of the target resource.
231
+ The value should not contain leading or trailing forward slashes.
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
+ *Available only for Vault Enterprise*.
234
+ """
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -173,14 +178,33 @@ def get_backend_issuer(backend: Optional[str] = None,
173
178
  namespace: Optional[str] = None,
174
179
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
175
180
  """
176
- Use this data source to access information about an existing resource.
181
+ ## Example Usage
182
+
183
+ ```python
184
+ import pulumi
185
+ import pulumi_vault as vault
186
+
187
+ pki = vault.Mount("pki",
188
+ path="pki",
189
+ type="pki",
190
+ description="PKI secret engine mount")
191
+ root = vault.pki_secret.SecretBackendRootCert("root",
192
+ backend=pki.path,
193
+ type="internal",
194
+ common_name="example",
195
+ ttl="86400",
196
+ issuer_name="example")
197
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
198
+ issuer_ref=issuer_id))
199
+ ```
200
+
177
201
 
178
202
  :param str backend: The path to the PKI secret backend to
179
203
  read the issuer from, with no leading or trailing `/`s.
180
204
  :param str issuer_ref: Reference to an existing issuer.
181
205
  :param str namespace: The namespace of the target resource.
182
206
  The value should not contain leading or trailing forward slashes.
183
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
184
208
  *Available only for Vault Enterprise*.
185
209
  """
186
210
  __args__ = dict()
@@ -203,22 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
203
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
204
228
  namespace=pulumi.get(__ret__, 'namespace'),
205
229
  usage=pulumi.get(__ret__, 'usage'))
206
-
207
-
208
- @_utilities.lift_output_func(get_backend_issuer)
209
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
210
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
211
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
233
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
213
234
  """
214
- Use this data source to access information about an existing resource.
235
+ ## Example Usage
236
+
237
+ ```python
238
+ import pulumi
239
+ import pulumi_vault as vault
240
+
241
+ pki = vault.Mount("pki",
242
+ path="pki",
243
+ type="pki",
244
+ description="PKI secret engine mount")
245
+ root = vault.pki_secret.SecretBackendRootCert("root",
246
+ backend=pki.path,
247
+ type="internal",
248
+ common_name="example",
249
+ ttl="86400",
250
+ issuer_name="example")
251
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
252
+ issuer_ref=issuer_id))
253
+ ```
254
+
215
255
 
216
256
  :param str backend: The path to the PKI secret backend to
217
257
  read the issuer from, with no leading or trailing `/`s.
218
258
  :param str issuer_ref: Reference to an existing issuer.
219
259
  :param str namespace: The namespace of the target resource.
220
260
  The value should not contain leading or trailing forward slashes.
221
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
261
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
222
262
  *Available only for Vault Enterprise*.
223
263
  """
224
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of issuer strings read from Vault.
62
67
  """
@@ -126,7 +131,7 @@ def get_backend_issuers(backend: Optional[str] = None,
126
131
  read the issuers from, with no leading or trailing `/`s.
127
132
  :param str namespace: The namespace of the target resource.
128
133
  The value should not contain leading or trailing forward slashes.
129
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
135
  *Available only for Vault Enterprise*.
131
136
  """
132
137
  __args__ = dict()
@@ -142,12 +147,9 @@ def get_backend_issuers(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_issuers)
148
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
151
153
  """
152
154
  ## Example Usage
153
155
 
@@ -173,7 +175,18 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
173
175
  read the issuers from, with no leading or trailing `/`s.
174
176
  :param str namespace: The namespace of the target resource.
175
177
  The value should not contain leading or trailing forward slashes.
176
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))