pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +59 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +216 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  178. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  179. pulumi_vault/pkisecret/secret_backend_role.py +66 -16
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +12 -7
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +58 -8
  189. pulumi_vault/quota_rate_limit.py +54 -4
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  193. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  194. pulumi_vault/raft_autopilot.py +12 -11
  195. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  196. pulumi_vault/rgp_policy.py +14 -13
  197. pulumi_vault/saml/auth_backend.py +20 -19
  198. pulumi_vault/saml/auth_backend_role.py +90 -199
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -75
  203. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  204. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  205. pulumi_vault/secrets/sync_config.py +7 -6
  206. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  207. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  210. pulumi_vault/ssh/_inputs.py +28 -32
  211. pulumi_vault/ssh/outputs.py +11 -32
  212. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  213. pulumi_vault/ssh/secret_backend_role.py +110 -120
  214. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  216. pulumi_vault/terraformcloud/secret_role.py +14 -76
  217. pulumi_vault/token.py +26 -25
  218. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  219. pulumi_vault/transform/alphabet.py +16 -13
  220. pulumi_vault/transform/get_decode.py +45 -21
  221. pulumi_vault/transform/get_encode.py +45 -21
  222. pulumi_vault/transform/role.py +16 -13
  223. pulumi_vault/transform/template.py +30 -25
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -25
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +25 -97
  228. pulumi_vault/transit/secret_cache_config.py +12 -11
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -114,7 +119,6 @@ def get_backend_key(backend: Optional[str] = None,
114
119
  """
115
120
  ## Example Usage
116
121
 
117
- <!--Start PulumiCodeChooser -->
118
122
  ```python
119
123
  import pulumi
120
124
  import pulumi_vault as vault
@@ -129,10 +133,9 @@ def get_backend_key(backend: Optional[str] = None,
129
133
  key_name="example",
130
134
  key_type="rsa",
131
135
  key_bits=4096)
132
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
136
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
133
137
  key_ref=key_id))
134
138
  ```
135
- <!--End PulumiCodeChooser -->
136
139
 
137
140
 
138
141
  :param str backend: The path to the PKI secret backend to
@@ -140,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
140
143
  :param str key_ref: Reference to an existing key.
141
144
  :param str namespace: The namespace of the target resource.
142
145
  The value should not contain leading or trailing forward slashes.
143
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
144
147
  *Available only for Vault Enterprise*.
145
148
  """
146
149
  __args__ = dict()
@@ -158,17 +161,13 @@ def get_backend_key(backend: Optional[str] = None,
158
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
159
162
  key_type=pulumi.get(__ret__, 'key_type'),
160
163
  namespace=pulumi.get(__ret__, 'namespace'))
161
-
162
-
163
- @_utilities.lift_output_func(get_backend_key)
164
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
165
  key_ref: Optional[pulumi.Input[str]] = None,
166
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
167
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
167
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
168
168
  """
169
169
  ## Example Usage
170
170
 
171
- <!--Start PulumiCodeChooser -->
172
171
  ```python
173
172
  import pulumi
174
173
  import pulumi_vault as vault
@@ -183,10 +182,9 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
183
182
  key_name="example",
184
183
  key_type="rsa",
185
184
  key_bits=4096)
186
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
185
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
187
186
  key_ref=key_id))
188
187
  ```
189
- <!--End PulumiCodeChooser -->
190
188
 
191
189
 
192
190
  :param str backend: The path to the PKI secret backend to
@@ -194,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
194
192
  :param str key_ref: Reference to an existing key.
195
193
  :param str namespace: The namespace of the target resource.
196
194
  The value should not contain leading or trailing forward slashes.
197
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
196
  *Available only for Vault Enterprise*.
199
197
  """
200
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of key strings read from Vault.
62
67
  """
@@ -104,7 +109,6 @@ def get_backend_keys(backend: Optional[str] = None,
104
109
  """
105
110
  ## Example Usage
106
111
 
107
- <!--Start PulumiCodeChooser -->
108
112
  ```python
109
113
  import pulumi
110
114
  import pulumi_vault as vault
@@ -121,14 +125,13 @@ def get_backend_keys(backend: Optional[str] = None,
121
125
  key_name="example")
122
126
  example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
123
127
  ```
124
- <!--End PulumiCodeChooser -->
125
128
 
126
129
 
127
130
  :param str backend: The path to the PKI secret backend to
128
131
  read the keys from, with no leading or trailing `/`s.
129
132
  :param str namespace: The namespace of the target resource.
130
133
  The value should not contain leading or trailing forward slashes.
131
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
135
  *Available only for Vault Enterprise*.
133
136
  """
134
137
  __args__ = dict()
@@ -144,16 +147,12 @@ def get_backend_keys(backend: Optional[str] = None,
144
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
145
148
  keys=pulumi.get(__ret__, 'keys'),
146
149
  namespace=pulumi.get(__ret__, 'namespace'))
147
-
148
-
149
- @_utilities.lift_output_func(get_backend_keys)
150
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
156
- <!--Start PulumiCodeChooser -->
157
156
  ```python
158
157
  import pulumi
159
158
  import pulumi_vault as vault
@@ -170,14 +169,24 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
170
169
  key_name="example")
171
170
  example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
172
171
  ```
173
- <!--End PulumiCodeChooser -->
174
172
 
175
173
 
176
174
  :param str backend: The path to the PKI secret backend to
177
175
  read the keys from, with no leading or trailing `/`s.
178
176
  :param str namespace: The namespace of the target resource.
179
177
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
179
  *Available only for Vault Enterprise*.
182
180
  """
183
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,15 +4,74 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigCmpv2Authenticators',
19
+ 'BackendConfigEstAuthenticators',
13
20
  'SecretBackendRolePolicyIdentifier',
21
+ 'GetBackendConfigCmpv2AuthenticatorResult',
22
+ 'GetBackendConfigEstAuthenticatorResult',
14
23
  ]
15
24
 
25
+ @pulumi.output_type
26
+ class BackendConfigCmpv2Authenticators(dict):
27
+ def __init__(__self__, *,
28
+ cert: Optional[Mapping[str, str]] = None):
29
+ """
30
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ if cert is not None:
33
+ pulumi.set(__self__, "cert", cert)
34
+
35
+ @property
36
+ @pulumi.getter
37
+ def cert(self) -> Optional[Mapping[str, str]]:
38
+ """
39
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
40
+ """
41
+ return pulumi.get(self, "cert")
42
+
43
+
44
+ @pulumi.output_type
45
+ class BackendConfigEstAuthenticators(dict):
46
+ def __init__(__self__, *,
47
+ cert: Optional[Mapping[str, str]] = None,
48
+ userpass: Optional[Mapping[str, str]] = None):
49
+ """
50
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
51
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
52
+ """
53
+ if cert is not None:
54
+ pulumi.set(__self__, "cert", cert)
55
+ if userpass is not None:
56
+ pulumi.set(__self__, "userpass", userpass)
57
+
58
+ @property
59
+ @pulumi.getter
60
+ def cert(self) -> Optional[Mapping[str, str]]:
61
+ """
62
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
63
+ """
64
+ return pulumi.get(self, "cert")
65
+
66
+ @property
67
+ @pulumi.getter
68
+ def userpass(self) -> Optional[Mapping[str, str]]:
69
+ """
70
+ "The accessor (required) property for user pass auth backends".
71
+ """
72
+ return pulumi.get(self, "userpass")
73
+
74
+
16
75
  @pulumi.output_type
17
76
  class SecretBackendRolePolicyIdentifier(dict):
18
77
  def __init__(__self__, *,
@@ -59,3 +118,53 @@ class SecretBackendRolePolicyIdentifier(dict):
59
118
  return pulumi.get(self, "notice")
60
119
 
61
120
 
121
+ @pulumi.output_type
122
+ class GetBackendConfigCmpv2AuthenticatorResult(dict):
123
+ def __init__(__self__, *,
124
+ cert: Optional[Mapping[str, str]] = None):
125
+ """
126
+ :param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
127
+ """
128
+ if cert is not None:
129
+ pulumi.set(__self__, "cert", cert)
130
+
131
+ @property
132
+ @pulumi.getter
133
+ def cert(self) -> Optional[Mapping[str, str]]:
134
+ """
135
+ The accessor and cert_role properties for cert auth backends
136
+ """
137
+ return pulumi.get(self, "cert")
138
+
139
+
140
+ @pulumi.output_type
141
+ class GetBackendConfigEstAuthenticatorResult(dict):
142
+ def __init__(__self__, *,
143
+ cert: Optional[Mapping[str, str]] = None,
144
+ userpass: Optional[Mapping[str, str]] = None):
145
+ """
146
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
147
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
148
+ """
149
+ if cert is not None:
150
+ pulumi.set(__self__, "cert", cert)
151
+ if userpass is not None:
152
+ pulumi.set(__self__, "userpass", userpass)
153
+
154
+ @property
155
+ @pulumi.getter
156
+ def cert(self) -> Optional[Mapping[str, str]]:
157
+ """
158
+ "The accessor and cert_role properties for cert auth backends".
159
+ """
160
+ return pulumi.get(self, "cert")
161
+
162
+ @property
163
+ @pulumi.getter
164
+ def userpass(self) -> Optional[Mapping[str, str]]:
165
+ """
166
+ "The accessor property for user pass auth backends".
167
+ """
168
+ return pulumi.get(self, "userpass")
169
+
170
+
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
45
50
  :param pulumi.Input[str] name: Name of the role to create the certificate against
46
51
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
47
52
  The value should not contain leading or trailing forward slashes.
48
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
53
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
54
  *Available only for Vault Enterprise*.
50
55
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
51
56
  :param pulumi.Input[str] private_key_format: The private key format
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
213
218
  """
214
219
  The namespace to provision the resource in.
215
220
  The value should not contain leading or trailing forward slashes.
216
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
221
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
222
  *Available only for Vault Enterprise*.
218
223
  """
219
224
  return pulumi.get(self, "namespace")
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
341
346
  :param pulumi.Input[str] name: Name of the role to create the certificate against
342
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
348
  The value should not contain leading or trailing forward slashes.
344
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
349
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
350
  *Available only for Vault Enterprise*.
346
351
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
347
352
  :param pulumi.Input[str] private_key: The private key
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
579
584
  """
580
585
  The namespace to provision the resource in.
581
586
  The value should not contain leading or trailing forward slashes.
582
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
583
588
  *Available only for Vault Enterprise*.
584
589
  """
585
590
  return pulumi.get(self, "namespace")
@@ -735,17 +740,16 @@ class SecretBackendCert(pulumi.CustomResource):
735
740
  """
736
741
  ## Example Usage
737
742
 
738
- <!--Start PulumiCodeChooser -->
739
743
  ```python
740
744
  import pulumi
741
745
  import pulumi_vault as vault
742
746
 
743
747
  app = vault.pki_secret.SecretBackendCert("app",
744
- backend=vault_mount["intermediate"]["path"],
748
+ backend=intermediate["path"],
749
+ name=test["name"],
745
750
  common_name="app.my.domain",
746
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
751
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
747
752
  ```
748
- <!--End PulumiCodeChooser -->
749
753
 
750
754
  :param str resource_name: The name of the resource.
751
755
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -761,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
761
765
  :param pulumi.Input[str] name: Name of the role to create the certificate against
762
766
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
763
767
  The value should not contain leading or trailing forward slashes.
764
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
768
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
765
769
  *Available only for Vault Enterprise*.
766
770
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
767
771
  :param pulumi.Input[str] private_key_format: The private key format
@@ -779,17 +783,16 @@ class SecretBackendCert(pulumi.CustomResource):
779
783
  """
780
784
  ## Example Usage
781
785
 
782
- <!--Start PulumiCodeChooser -->
783
786
  ```python
784
787
  import pulumi
785
788
  import pulumi_vault as vault
786
789
 
787
790
  app = vault.pki_secret.SecretBackendCert("app",
788
- backend=vault_mount["intermediate"]["path"],
791
+ backend=intermediate["path"],
792
+ name=test["name"],
789
793
  common_name="app.my.domain",
790
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
794
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
791
795
  ```
792
- <!--End PulumiCodeChooser -->
793
796
 
794
797
  :param str resource_name: The name of the resource.
795
798
  :param SecretBackendCertArgs args: The arguments to use to populate this resource's properties.
@@ -921,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
921
924
  :param pulumi.Input[str] name: Name of the role to create the certificate against
922
925
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
923
926
  The value should not contain leading or trailing forward slashes.
924
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
927
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
925
928
  *Available only for Vault Enterprise*.
926
929
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
927
930
  :param pulumi.Input[str] private_key: The private key
@@ -1083,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
1083
1086
  """
1084
1087
  The namespace to provision the resource in.
1085
1088
  The value should not contain leading or trailing forward slashes.
1086
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1089
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1087
1090
  *Available only for Vault Enterprise*.
1088
1091
  """
1089
1092
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
23
28
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
82
87
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
88
93
  """
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -145,13 +150,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
145
150
  """
146
151
  ## Example Usage
147
152
 
148
- <!--Start PulumiCodeChooser -->
149
153
  ```python
150
154
  import pulumi
151
155
  import pulumi_vault as vault
152
156
 
153
157
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
154
- backend=vault_mount["intermediate"]["path"],
158
+ backend=intermediate_vault_mount["path"],
155
159
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
156
160
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
157
161
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -201,16 +205,15 @@ class SecretBackendConfigCa(pulumi.CustomResource):
201
205
  MUR4qFxeUOW/GJGccMUd
202
206
  -----END CERTIFICATE-----
203
207
  \"\"\",
204
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
208
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
205
209
  ```
206
- <!--End PulumiCodeChooser -->
207
210
 
208
211
  :param str resource_name: The name of the resource.
209
212
  :param pulumi.ResourceOptions opts: Options for the resource.
210
213
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
211
214
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
212
215
  The value should not contain leading or trailing forward slashes.
213
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
217
  *Available only for Vault Enterprise*.
215
218
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
216
219
  """
@@ -223,13 +226,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
223
226
  """
224
227
  ## Example Usage
225
228
 
226
- <!--Start PulumiCodeChooser -->
227
229
  ```python
228
230
  import pulumi
229
231
  import pulumi_vault as vault
230
232
 
231
233
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
232
- backend=vault_mount["intermediate"]["path"],
234
+ backend=intermediate_vault_mount["path"],
233
235
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
234
236
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
235
237
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -279,9 +281,8 @@ class SecretBackendConfigCa(pulumi.CustomResource):
279
281
  MUR4qFxeUOW/GJGccMUd
280
282
  -----END CERTIFICATE-----
281
283
  \"\"\",
282
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
284
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
283
285
  ```
284
- <!--End PulumiCodeChooser -->
285
286
 
286
287
  :param str resource_name: The name of the resource.
287
288
  :param SecretBackendConfigCaArgs args: The arguments to use to populate this resource's properties.
@@ -342,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
342
343
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
343
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
344
345
  The value should not contain leading or trailing forward slashes.
345
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
346
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
346
347
  *Available only for Vault Enterprise*.
347
348
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
348
349
  """
@@ -369,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
369
370
  """
370
371
  The namespace to provision the resource in.
371
372
  The value should not contain leading or trailing forward slashes.
372
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
373
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
373
374
  *Available only for Vault Enterprise*.
374
375
  """
375
376
  return pulumi.get(self, "namespace")