pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,251 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
|
18
|
+
__all__ = [
|
19
|
+
'GetBackendConfigEstResult',
|
20
|
+
'AwaitableGetBackendConfigEstResult',
|
21
|
+
'get_backend_config_est',
|
22
|
+
'get_backend_config_est_output',
|
23
|
+
]
|
24
|
+
|
25
|
+
@pulumi.output_type
|
26
|
+
class GetBackendConfigEstResult:
|
27
|
+
"""
|
28
|
+
A collection of values returned by getBackendConfigEst.
|
29
|
+
"""
|
30
|
+
def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
|
31
|
+
if audit_fields and not isinstance(audit_fields, list):
|
32
|
+
raise TypeError("Expected argument 'audit_fields' to be a list")
|
33
|
+
pulumi.set(__self__, "audit_fields", audit_fields)
|
34
|
+
if authenticators and not isinstance(authenticators, list):
|
35
|
+
raise TypeError("Expected argument 'authenticators' to be a list")
|
36
|
+
pulumi.set(__self__, "authenticators", authenticators)
|
37
|
+
if backend and not isinstance(backend, str):
|
38
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
39
|
+
pulumi.set(__self__, "backend", backend)
|
40
|
+
if default_mount and not isinstance(default_mount, bool):
|
41
|
+
raise TypeError("Expected argument 'default_mount' to be a bool")
|
42
|
+
pulumi.set(__self__, "default_mount", default_mount)
|
43
|
+
if default_path_policy and not isinstance(default_path_policy, str):
|
44
|
+
raise TypeError("Expected argument 'default_path_policy' to be a str")
|
45
|
+
pulumi.set(__self__, "default_path_policy", default_path_policy)
|
46
|
+
if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
|
47
|
+
raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
|
48
|
+
pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
|
49
|
+
if enabled and not isinstance(enabled, bool):
|
50
|
+
raise TypeError("Expected argument 'enabled' to be a bool")
|
51
|
+
pulumi.set(__self__, "enabled", enabled)
|
52
|
+
if id and not isinstance(id, str):
|
53
|
+
raise TypeError("Expected argument 'id' to be a str")
|
54
|
+
pulumi.set(__self__, "id", id)
|
55
|
+
if label_to_path_policy and not isinstance(label_to_path_policy, dict):
|
56
|
+
raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
|
57
|
+
pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
|
58
|
+
if last_updated and not isinstance(last_updated, str):
|
59
|
+
raise TypeError("Expected argument 'last_updated' to be a str")
|
60
|
+
pulumi.set(__self__, "last_updated", last_updated)
|
61
|
+
if namespace and not isinstance(namespace, str):
|
62
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
63
|
+
pulumi.set(__self__, "namespace", namespace)
|
64
|
+
|
65
|
+
@property
|
66
|
+
@pulumi.getter(name="auditFields")
|
67
|
+
def audit_fields(self) -> Sequence[str]:
|
68
|
+
"""
|
69
|
+
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
70
|
+
"""
|
71
|
+
return pulumi.get(self, "audit_fields")
|
72
|
+
|
73
|
+
@property
|
74
|
+
@pulumi.getter
|
75
|
+
def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
|
76
|
+
"""
|
77
|
+
Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
78
|
+
"""
|
79
|
+
return pulumi.get(self, "authenticators")
|
80
|
+
|
81
|
+
@property
|
82
|
+
@pulumi.getter
|
83
|
+
def backend(self) -> str:
|
84
|
+
return pulumi.get(self, "backend")
|
85
|
+
|
86
|
+
@property
|
87
|
+
@pulumi.getter(name="defaultMount")
|
88
|
+
def default_mount(self) -> bool:
|
89
|
+
"""
|
90
|
+
If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
91
|
+
"""
|
92
|
+
return pulumi.get(self, "default_mount")
|
93
|
+
|
94
|
+
@property
|
95
|
+
@pulumi.getter(name="defaultPathPolicy")
|
96
|
+
def default_path_policy(self) -> str:
|
97
|
+
"""
|
98
|
+
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
99
|
+
"""
|
100
|
+
return pulumi.get(self, "default_path_policy")
|
101
|
+
|
102
|
+
@property
|
103
|
+
@pulumi.getter(name="enableSentinelParsing")
|
104
|
+
def enable_sentinel_parsing(self) -> bool:
|
105
|
+
"""
|
106
|
+
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
107
|
+
"""
|
108
|
+
return pulumi.get(self, "enable_sentinel_parsing")
|
109
|
+
|
110
|
+
@property
|
111
|
+
@pulumi.getter
|
112
|
+
def enabled(self) -> bool:
|
113
|
+
"""
|
114
|
+
Specifies whether EST is enabled.
|
115
|
+
"""
|
116
|
+
return pulumi.get(self, "enabled")
|
117
|
+
|
118
|
+
@property
|
119
|
+
@pulumi.getter
|
120
|
+
def id(self) -> str:
|
121
|
+
"""
|
122
|
+
The provider-assigned unique ID for this managed resource.
|
123
|
+
"""
|
124
|
+
return pulumi.get(self, "id")
|
125
|
+
|
126
|
+
@property
|
127
|
+
@pulumi.getter(name="labelToPathPolicy")
|
128
|
+
def label_to_path_policy(self) -> Mapping[str, str]:
|
129
|
+
"""
|
130
|
+
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
131
|
+
"""
|
132
|
+
return pulumi.get(self, "label_to_path_policy")
|
133
|
+
|
134
|
+
@property
|
135
|
+
@pulumi.getter(name="lastUpdated")
|
136
|
+
def last_updated(self) -> str:
|
137
|
+
"""
|
138
|
+
A read-only timestamp representing the last time the configuration was updated.
|
139
|
+
"""
|
140
|
+
return pulumi.get(self, "last_updated")
|
141
|
+
|
142
|
+
@property
|
143
|
+
@pulumi.getter
|
144
|
+
def namespace(self) -> Optional[str]:
|
145
|
+
return pulumi.get(self, "namespace")
|
146
|
+
|
147
|
+
|
148
|
+
class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
|
149
|
+
# pylint: disable=using-constant-test
|
150
|
+
def __await__(self):
|
151
|
+
if False:
|
152
|
+
yield self
|
153
|
+
return GetBackendConfigEstResult(
|
154
|
+
audit_fields=self.audit_fields,
|
155
|
+
authenticators=self.authenticators,
|
156
|
+
backend=self.backend,
|
157
|
+
default_mount=self.default_mount,
|
158
|
+
default_path_policy=self.default_path_policy,
|
159
|
+
enable_sentinel_parsing=self.enable_sentinel_parsing,
|
160
|
+
enabled=self.enabled,
|
161
|
+
id=self.id,
|
162
|
+
label_to_path_policy=self.label_to_path_policy,
|
163
|
+
last_updated=self.last_updated,
|
164
|
+
namespace=self.namespace)
|
165
|
+
|
166
|
+
|
167
|
+
def get_backend_config_est(backend: Optional[str] = None,
|
168
|
+
namespace: Optional[str] = None,
|
169
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
|
170
|
+
"""
|
171
|
+
## Example Usage
|
172
|
+
|
173
|
+
```python
|
174
|
+
import pulumi
|
175
|
+
import pulumi_vault as vault
|
176
|
+
|
177
|
+
pki = vault.Mount("pki",
|
178
|
+
path="pki",
|
179
|
+
type="pki",
|
180
|
+
description="PKI secret engine mount")
|
181
|
+
est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
|
182
|
+
```
|
183
|
+
|
184
|
+
|
185
|
+
:param str backend: The path to the PKI secret backend to
|
186
|
+
read the EST configuration from, with no leading or trailing `/`s.
|
187
|
+
:param str namespace: The namespace of the target resource.
|
188
|
+
The value should not contain leading or trailing forward slashes.
|
189
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
|
+
*Available only for Vault Enterprise*.
|
191
|
+
"""
|
192
|
+
__args__ = dict()
|
193
|
+
__args__['backend'] = backend
|
194
|
+
__args__['namespace'] = namespace
|
195
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
196
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
|
197
|
+
|
198
|
+
return AwaitableGetBackendConfigEstResult(
|
199
|
+
audit_fields=pulumi.get(__ret__, 'audit_fields'),
|
200
|
+
authenticators=pulumi.get(__ret__, 'authenticators'),
|
201
|
+
backend=pulumi.get(__ret__, 'backend'),
|
202
|
+
default_mount=pulumi.get(__ret__, 'default_mount'),
|
203
|
+
default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
|
204
|
+
enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
|
205
|
+
enabled=pulumi.get(__ret__, 'enabled'),
|
206
|
+
id=pulumi.get(__ret__, 'id'),
|
207
|
+
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
208
|
+
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
210
|
+
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
|
+
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
213
|
+
"""
|
214
|
+
## Example Usage
|
215
|
+
|
216
|
+
```python
|
217
|
+
import pulumi
|
218
|
+
import pulumi_vault as vault
|
219
|
+
|
220
|
+
pki = vault.Mount("pki",
|
221
|
+
path="pki",
|
222
|
+
type="pki",
|
223
|
+
description="PKI secret engine mount")
|
224
|
+
est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
|
225
|
+
```
|
226
|
+
|
227
|
+
|
228
|
+
:param str backend: The path to the PKI secret backend to
|
229
|
+
read the EST configuration from, with no leading or trailing `/`s.
|
230
|
+
:param str namespace: The namespace of the target resource.
|
231
|
+
The value should not contain leading or trailing forward slashes.
|
232
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
|
+
*Available only for Vault Enterprise*.
|
234
|
+
"""
|
235
|
+
__args__ = dict()
|
236
|
+
__args__['backend'] = backend
|
237
|
+
__args__['namespace'] = namespace
|
238
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
|
+
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
|
+
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
242
|
+
authenticators=pulumi.get(__response__, 'authenticators'),
|
243
|
+
backend=pulumi.get(__response__, 'backend'),
|
244
|
+
default_mount=pulumi.get(__response__, 'default_mount'),
|
245
|
+
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
246
|
+
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
247
|
+
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
+
id=pulumi.get(__response__, 'id'),
|
249
|
+
label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
|
250
|
+
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -173,14 +178,33 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
173
178
|
namespace: Optional[str] = None,
|
174
179
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
175
180
|
"""
|
176
|
-
|
181
|
+
## Example Usage
|
182
|
+
|
183
|
+
```python
|
184
|
+
import pulumi
|
185
|
+
import pulumi_vault as vault
|
186
|
+
|
187
|
+
pki = vault.Mount("pki",
|
188
|
+
path="pki",
|
189
|
+
type="pki",
|
190
|
+
description="PKI secret engine mount")
|
191
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
192
|
+
backend=pki.path,
|
193
|
+
type="internal",
|
194
|
+
common_name="example",
|
195
|
+
ttl="86400",
|
196
|
+
issuer_name="example")
|
197
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
198
|
+
issuer_ref=issuer_id))
|
199
|
+
```
|
200
|
+
|
177
201
|
|
178
202
|
:param str backend: The path to the PKI secret backend to
|
179
203
|
read the issuer from, with no leading or trailing `/`s.
|
180
204
|
:param str issuer_ref: Reference to an existing issuer.
|
181
205
|
:param str namespace: The namespace of the target resource.
|
182
206
|
The value should not contain leading or trailing forward slashes.
|
183
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
207
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
184
208
|
*Available only for Vault Enterprise*.
|
185
209
|
"""
|
186
210
|
__args__ = dict()
|
@@ -203,22 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
203
227
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
204
228
|
namespace=pulumi.get(__ret__, 'namespace'),
|
205
229
|
usage=pulumi.get(__ret__, 'usage'))
|
206
|
-
|
207
|
-
|
208
|
-
@_utilities.lift_output_func(get_backend_issuer)
|
209
230
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
210
231
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
211
232
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
233
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
213
234
|
"""
|
214
|
-
|
235
|
+
## Example Usage
|
236
|
+
|
237
|
+
```python
|
238
|
+
import pulumi
|
239
|
+
import pulumi_vault as vault
|
240
|
+
|
241
|
+
pki = vault.Mount("pki",
|
242
|
+
path="pki",
|
243
|
+
type="pki",
|
244
|
+
description="PKI secret engine mount")
|
245
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
246
|
+
backend=pki.path,
|
247
|
+
type="internal",
|
248
|
+
common_name="example",
|
249
|
+
ttl="86400",
|
250
|
+
issuer_name="example")
|
251
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
252
|
+
issuer_ref=issuer_id))
|
253
|
+
```
|
254
|
+
|
215
255
|
|
216
256
|
:param str backend: The path to the PKI secret backend to
|
217
257
|
read the issuer from, with no leading or trailing `/`s.
|
218
258
|
:param str issuer_ref: Reference to an existing issuer.
|
219
259
|
:param str namespace: The namespace of the target resource.
|
220
260
|
The value should not contain leading or trailing forward slashes.
|
221
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
261
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
222
262
|
*Available only for Vault Enterprise*.
|
223
263
|
"""
|
224
|
-
|
264
|
+
__args__ = dict()
|
265
|
+
__args__['backend'] = backend
|
266
|
+
__args__['issuerRef'] = issuer_ref
|
267
|
+
__args__['namespace'] = namespace
|
268
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
|
+
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
|
+
backend=pulumi.get(__response__, 'backend'),
|
272
|
+
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
|
+
certificate=pulumi.get(__response__, 'certificate'),
|
274
|
+
id=pulumi.get(__response__, 'id'),
|
275
|
+
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
|
+
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
277
|
+
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
278
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
279
|
+
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
280
|
+
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
281
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
282
|
+
usage=pulumi.get(__response__, 'usage')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of issuer strings read from Vault.
|
62
67
|
"""
|
@@ -126,7 +131,7 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
126
131
|
read the issuers from, with no leading or trailing `/`s.
|
127
132
|
:param str namespace: The namespace of the target resource.
|
128
133
|
The value should not contain leading or trailing forward slashes.
|
129
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
130
135
|
*Available only for Vault Enterprise*.
|
131
136
|
"""
|
132
137
|
__args__ = dict()
|
@@ -142,12 +147,9 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
142
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
143
148
|
keys=pulumi.get(__ret__, 'keys'),
|
144
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
-
|
146
|
-
|
147
|
-
@_utilities.lift_output_func(get_backend_issuers)
|
148
150
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
149
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
150
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
151
153
|
"""
|
152
154
|
## Example Usage
|
153
155
|
|
@@ -173,7 +175,18 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
173
175
|
read the issuers from, with no leading or trailing `/`s.
|
174
176
|
:param str namespace: The namespace of the target resource.
|
175
177
|
The value should not contain leading or trailing forward slashes.
|
176
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
179
|
*Available only for Vault Enterprise*.
|
178
180
|
"""
|
179
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -128,7 +133,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
128
133
|
key_name="example",
|
129
134
|
key_type="rsa",
|
130
135
|
key_bits=4096)
|
131
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
136
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
132
137
|
key_ref=key_id))
|
133
138
|
```
|
134
139
|
|
@@ -138,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
138
143
|
:param str key_ref: Reference to an existing key.
|
139
144
|
:param str namespace: The namespace of the target resource.
|
140
145
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
147
|
*Available only for Vault Enterprise*.
|
143
148
|
"""
|
144
149
|
__args__ = dict()
|
@@ -156,13 +161,10 @@ def get_backend_key(backend: Optional[str] = None,
|
|
156
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
157
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
158
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
159
|
-
|
160
|
-
|
161
|
-
@_utilities.lift_output_func(get_backend_key)
|
162
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
163
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
164
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
165
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
|
167
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
166
168
|
"""
|
167
169
|
## Example Usage
|
168
170
|
|
@@ -180,7 +182,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
180
182
|
key_name="example",
|
181
183
|
key_type="rsa",
|
182
184
|
key_bits=4096)
|
183
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
185
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
184
186
|
key_ref=key_id))
|
185
187
|
```
|
186
188
|
|
@@ -190,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
190
192
|
:param str key_ref: Reference to an existing key.
|
191
193
|
:param str namespace: The namespace of the target resource.
|
192
194
|
The value should not contain leading or trailing forward slashes.
|
193
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
194
196
|
*Available only for Vault Enterprise*.
|
195
197
|
"""
|
196
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['keyRef'] = key_ref
|
201
|
+
__args__['namespace'] = namespace
|
202
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of key strings read from Vault.
|
62
67
|
"""
|
@@ -126,7 +131,7 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
126
131
|
read the keys from, with no leading or trailing `/`s.
|
127
132
|
:param str namespace: The namespace of the target resource.
|
128
133
|
The value should not contain leading or trailing forward slashes.
|
129
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
130
135
|
*Available only for Vault Enterprise*.
|
131
136
|
"""
|
132
137
|
__args__ = dict()
|
@@ -142,12 +147,9 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
142
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
143
148
|
keys=pulumi.get(__ret__, 'keys'),
|
144
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
-
|
146
|
-
|
147
|
-
@_utilities.lift_output_func(get_backend_keys)
|
148
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
149
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
150
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
151
153
|
"""
|
152
154
|
## Example Usage
|
153
155
|
|
@@ -173,7 +175,18 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
173
175
|
read the keys from, with no leading or trailing `/`s.
|
174
176
|
:param str namespace: The namespace of the target resource.
|
175
177
|
The value should not contain leading or trailing forward slashes.
|
176
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
179
|
*Available only for Vault Enterprise*.
|
178
180
|
"""
|
179
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,15 +4,53 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigEstAuthenticators',
|
13
19
|
'SecretBackendRolePolicyIdentifier',
|
20
|
+
'GetBackendConfigEstAuthenticatorResult',
|
14
21
|
]
|
15
22
|
|
23
|
+
@pulumi.output_type
|
24
|
+
class BackendConfigEstAuthenticators(dict):
|
25
|
+
def __init__(__self__, *,
|
26
|
+
cert: Optional[Mapping[str, str]] = None,
|
27
|
+
userpass: Optional[Mapping[str, str]] = None):
|
28
|
+
"""
|
29
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
30
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
31
|
+
"""
|
32
|
+
if cert is not None:
|
33
|
+
pulumi.set(__self__, "cert", cert)
|
34
|
+
if userpass is not None:
|
35
|
+
pulumi.set(__self__, "userpass", userpass)
|
36
|
+
|
37
|
+
@property
|
38
|
+
@pulumi.getter
|
39
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
40
|
+
"""
|
41
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
42
|
+
"""
|
43
|
+
return pulumi.get(self, "cert")
|
44
|
+
|
45
|
+
@property
|
46
|
+
@pulumi.getter
|
47
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
48
|
+
"""
|
49
|
+
"The accessor (required) property for user pass auth backends".
|
50
|
+
"""
|
51
|
+
return pulumi.get(self, "userpass")
|
52
|
+
|
53
|
+
|
16
54
|
@pulumi.output_type
|
17
55
|
class SecretBackendRolePolicyIdentifier(dict):
|
18
56
|
def __init__(__self__, *,
|
@@ -59,3 +97,34 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
59
97
|
return pulumi.get(self, "notice")
|
60
98
|
|
61
99
|
|
100
|
+
@pulumi.output_type
|
101
|
+
class GetBackendConfigEstAuthenticatorResult(dict):
|
102
|
+
def __init__(__self__, *,
|
103
|
+
cert: Optional[Mapping[str, str]] = None,
|
104
|
+
userpass: Optional[Mapping[str, str]] = None):
|
105
|
+
"""
|
106
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
107
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
108
|
+
"""
|
109
|
+
if cert is not None:
|
110
|
+
pulumi.set(__self__, "cert", cert)
|
111
|
+
if userpass is not None:
|
112
|
+
pulumi.set(__self__, "userpass", userpass)
|
113
|
+
|
114
|
+
@property
|
115
|
+
@pulumi.getter
|
116
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
117
|
+
"""
|
118
|
+
"The accessor and cert_role properties for cert auth backends".
|
119
|
+
"""
|
120
|
+
return pulumi.get(self, "cert")
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter
|
124
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
125
|
+
"""
|
126
|
+
"The accessor property for user pass auth backends".
|
127
|
+
"""
|
128
|
+
return pulumi.get(self, "userpass")
|
129
|
+
|
130
|
+
|