pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,251 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
|
18
|
+
__all__ = [
|
19
|
+
'GetBackendConfigEstResult',
|
20
|
+
'AwaitableGetBackendConfigEstResult',
|
21
|
+
'get_backend_config_est',
|
22
|
+
'get_backend_config_est_output',
|
23
|
+
]
|
24
|
+
|
25
|
+
@pulumi.output_type
|
26
|
+
class GetBackendConfigEstResult:
|
27
|
+
"""
|
28
|
+
A collection of values returned by getBackendConfigEst.
|
29
|
+
"""
|
30
|
+
def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
|
31
|
+
if audit_fields and not isinstance(audit_fields, list):
|
32
|
+
raise TypeError("Expected argument 'audit_fields' to be a list")
|
33
|
+
pulumi.set(__self__, "audit_fields", audit_fields)
|
34
|
+
if authenticators and not isinstance(authenticators, list):
|
35
|
+
raise TypeError("Expected argument 'authenticators' to be a list")
|
36
|
+
pulumi.set(__self__, "authenticators", authenticators)
|
37
|
+
if backend and not isinstance(backend, str):
|
38
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
39
|
+
pulumi.set(__self__, "backend", backend)
|
40
|
+
if default_mount and not isinstance(default_mount, bool):
|
41
|
+
raise TypeError("Expected argument 'default_mount' to be a bool")
|
42
|
+
pulumi.set(__self__, "default_mount", default_mount)
|
43
|
+
if default_path_policy and not isinstance(default_path_policy, str):
|
44
|
+
raise TypeError("Expected argument 'default_path_policy' to be a str")
|
45
|
+
pulumi.set(__self__, "default_path_policy", default_path_policy)
|
46
|
+
if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
|
47
|
+
raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
|
48
|
+
pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
|
49
|
+
if enabled and not isinstance(enabled, bool):
|
50
|
+
raise TypeError("Expected argument 'enabled' to be a bool")
|
51
|
+
pulumi.set(__self__, "enabled", enabled)
|
52
|
+
if id and not isinstance(id, str):
|
53
|
+
raise TypeError("Expected argument 'id' to be a str")
|
54
|
+
pulumi.set(__self__, "id", id)
|
55
|
+
if label_to_path_policy and not isinstance(label_to_path_policy, dict):
|
56
|
+
raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
|
57
|
+
pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
|
58
|
+
if last_updated and not isinstance(last_updated, str):
|
59
|
+
raise TypeError("Expected argument 'last_updated' to be a str")
|
60
|
+
pulumi.set(__self__, "last_updated", last_updated)
|
61
|
+
if namespace and not isinstance(namespace, str):
|
62
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
63
|
+
pulumi.set(__self__, "namespace", namespace)
|
64
|
+
|
65
|
+
@property
|
66
|
+
@pulumi.getter(name="auditFields")
|
67
|
+
def audit_fields(self) -> Sequence[str]:
|
68
|
+
"""
|
69
|
+
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
70
|
+
"""
|
71
|
+
return pulumi.get(self, "audit_fields")
|
72
|
+
|
73
|
+
@property
|
74
|
+
@pulumi.getter
|
75
|
+
def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
|
76
|
+
"""
|
77
|
+
Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
78
|
+
"""
|
79
|
+
return pulumi.get(self, "authenticators")
|
80
|
+
|
81
|
+
@property
|
82
|
+
@pulumi.getter
|
83
|
+
def backend(self) -> str:
|
84
|
+
return pulumi.get(self, "backend")
|
85
|
+
|
86
|
+
@property
|
87
|
+
@pulumi.getter(name="defaultMount")
|
88
|
+
def default_mount(self) -> bool:
|
89
|
+
"""
|
90
|
+
If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
91
|
+
"""
|
92
|
+
return pulumi.get(self, "default_mount")
|
93
|
+
|
94
|
+
@property
|
95
|
+
@pulumi.getter(name="defaultPathPolicy")
|
96
|
+
def default_path_policy(self) -> str:
|
97
|
+
"""
|
98
|
+
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
99
|
+
"""
|
100
|
+
return pulumi.get(self, "default_path_policy")
|
101
|
+
|
102
|
+
@property
|
103
|
+
@pulumi.getter(name="enableSentinelParsing")
|
104
|
+
def enable_sentinel_parsing(self) -> bool:
|
105
|
+
"""
|
106
|
+
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
107
|
+
"""
|
108
|
+
return pulumi.get(self, "enable_sentinel_parsing")
|
109
|
+
|
110
|
+
@property
|
111
|
+
@pulumi.getter
|
112
|
+
def enabled(self) -> bool:
|
113
|
+
"""
|
114
|
+
Specifies whether EST is enabled.
|
115
|
+
"""
|
116
|
+
return pulumi.get(self, "enabled")
|
117
|
+
|
118
|
+
@property
|
119
|
+
@pulumi.getter
|
120
|
+
def id(self) -> str:
|
121
|
+
"""
|
122
|
+
The provider-assigned unique ID for this managed resource.
|
123
|
+
"""
|
124
|
+
return pulumi.get(self, "id")
|
125
|
+
|
126
|
+
@property
|
127
|
+
@pulumi.getter(name="labelToPathPolicy")
|
128
|
+
def label_to_path_policy(self) -> Mapping[str, str]:
|
129
|
+
"""
|
130
|
+
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
131
|
+
"""
|
132
|
+
return pulumi.get(self, "label_to_path_policy")
|
133
|
+
|
134
|
+
@property
|
135
|
+
@pulumi.getter(name="lastUpdated")
|
136
|
+
def last_updated(self) -> str:
|
137
|
+
"""
|
138
|
+
A read-only timestamp representing the last time the configuration was updated.
|
139
|
+
"""
|
140
|
+
return pulumi.get(self, "last_updated")
|
141
|
+
|
142
|
+
@property
|
143
|
+
@pulumi.getter
|
144
|
+
def namespace(self) -> Optional[str]:
|
145
|
+
return pulumi.get(self, "namespace")
|
146
|
+
|
147
|
+
|
148
|
+
class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
|
149
|
+
# pylint: disable=using-constant-test
|
150
|
+
def __await__(self):
|
151
|
+
if False:
|
152
|
+
yield self
|
153
|
+
return GetBackendConfigEstResult(
|
154
|
+
audit_fields=self.audit_fields,
|
155
|
+
authenticators=self.authenticators,
|
156
|
+
backend=self.backend,
|
157
|
+
default_mount=self.default_mount,
|
158
|
+
default_path_policy=self.default_path_policy,
|
159
|
+
enable_sentinel_parsing=self.enable_sentinel_parsing,
|
160
|
+
enabled=self.enabled,
|
161
|
+
id=self.id,
|
162
|
+
label_to_path_policy=self.label_to_path_policy,
|
163
|
+
last_updated=self.last_updated,
|
164
|
+
namespace=self.namespace)
|
165
|
+
|
166
|
+
|
167
|
+
def get_backend_config_est(backend: Optional[str] = None,
|
168
|
+
namespace: Optional[str] = None,
|
169
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
|
170
|
+
"""
|
171
|
+
## Example Usage
|
172
|
+
|
173
|
+
```python
|
174
|
+
import pulumi
|
175
|
+
import pulumi_vault as vault
|
176
|
+
|
177
|
+
pki = vault.Mount("pki",
|
178
|
+
path="pki",
|
179
|
+
type="pki",
|
180
|
+
description="PKI secret engine mount")
|
181
|
+
est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
|
182
|
+
```
|
183
|
+
|
184
|
+
|
185
|
+
:param str backend: The path to the PKI secret backend to
|
186
|
+
read the EST configuration from, with no leading or trailing `/`s.
|
187
|
+
:param str namespace: The namespace of the target resource.
|
188
|
+
The value should not contain leading or trailing forward slashes.
|
189
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
|
+
*Available only for Vault Enterprise*.
|
191
|
+
"""
|
192
|
+
__args__ = dict()
|
193
|
+
__args__['backend'] = backend
|
194
|
+
__args__['namespace'] = namespace
|
195
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
196
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
|
197
|
+
|
198
|
+
return AwaitableGetBackendConfigEstResult(
|
199
|
+
audit_fields=pulumi.get(__ret__, 'audit_fields'),
|
200
|
+
authenticators=pulumi.get(__ret__, 'authenticators'),
|
201
|
+
backend=pulumi.get(__ret__, 'backend'),
|
202
|
+
default_mount=pulumi.get(__ret__, 'default_mount'),
|
203
|
+
default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
|
204
|
+
enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
|
205
|
+
enabled=pulumi.get(__ret__, 'enabled'),
|
206
|
+
id=pulumi.get(__ret__, 'id'),
|
207
|
+
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
208
|
+
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
210
|
+
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
|
+
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
213
|
+
"""
|
214
|
+
## Example Usage
|
215
|
+
|
216
|
+
```python
|
217
|
+
import pulumi
|
218
|
+
import pulumi_vault as vault
|
219
|
+
|
220
|
+
pki = vault.Mount("pki",
|
221
|
+
path="pki",
|
222
|
+
type="pki",
|
223
|
+
description="PKI secret engine mount")
|
224
|
+
est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
|
225
|
+
```
|
226
|
+
|
227
|
+
|
228
|
+
:param str backend: The path to the PKI secret backend to
|
229
|
+
read the EST configuration from, with no leading or trailing `/`s.
|
230
|
+
:param str namespace: The namespace of the target resource.
|
231
|
+
The value should not contain leading or trailing forward slashes.
|
232
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
|
+
*Available only for Vault Enterprise*.
|
234
|
+
"""
|
235
|
+
__args__ = dict()
|
236
|
+
__args__['backend'] = backend
|
237
|
+
__args__['namespace'] = namespace
|
238
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
|
+
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
|
+
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
242
|
+
authenticators=pulumi.get(__response__, 'authenticators'),
|
243
|
+
backend=pulumi.get(__response__, 'backend'),
|
244
|
+
default_mount=pulumi.get(__response__, 'default_mount'),
|
245
|
+
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
246
|
+
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
247
|
+
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
+
id=pulumi.get(__response__, 'id'),
|
249
|
+
label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
|
250
|
+
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -175,13 +180,31 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
175
180
|
"""
|
176
181
|
## Example Usage
|
177
182
|
|
183
|
+
```python
|
184
|
+
import pulumi
|
185
|
+
import pulumi_vault as vault
|
186
|
+
|
187
|
+
pki = vault.Mount("pki",
|
188
|
+
path="pki",
|
189
|
+
type="pki",
|
190
|
+
description="PKI secret engine mount")
|
191
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
192
|
+
backend=pki.path,
|
193
|
+
type="internal",
|
194
|
+
common_name="example",
|
195
|
+
ttl="86400",
|
196
|
+
issuer_name="example")
|
197
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
198
|
+
issuer_ref=issuer_id))
|
199
|
+
```
|
200
|
+
|
178
201
|
|
179
202
|
:param str backend: The path to the PKI secret backend to
|
180
203
|
read the issuer from, with no leading or trailing `/`s.
|
181
204
|
:param str issuer_ref: Reference to an existing issuer.
|
182
205
|
:param str namespace: The namespace of the target resource.
|
183
206
|
The value should not contain leading or trailing forward slashes.
|
184
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
207
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
185
208
|
*Available only for Vault Enterprise*.
|
186
209
|
"""
|
187
210
|
__args__ = dict()
|
@@ -204,23 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
204
227
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
205
228
|
namespace=pulumi.get(__ret__, 'namespace'),
|
206
229
|
usage=pulumi.get(__ret__, 'usage'))
|
207
|
-
|
208
|
-
|
209
|
-
@_utilities.lift_output_func(get_backend_issuer)
|
210
230
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
211
231
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
212
232
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
213
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
233
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
214
234
|
"""
|
215
235
|
## Example Usage
|
216
236
|
|
237
|
+
```python
|
238
|
+
import pulumi
|
239
|
+
import pulumi_vault as vault
|
240
|
+
|
241
|
+
pki = vault.Mount("pki",
|
242
|
+
path="pki",
|
243
|
+
type="pki",
|
244
|
+
description="PKI secret engine mount")
|
245
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
246
|
+
backend=pki.path,
|
247
|
+
type="internal",
|
248
|
+
common_name="example",
|
249
|
+
ttl="86400",
|
250
|
+
issuer_name="example")
|
251
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
252
|
+
issuer_ref=issuer_id))
|
253
|
+
```
|
254
|
+
|
217
255
|
|
218
256
|
:param str backend: The path to the PKI secret backend to
|
219
257
|
read the issuer from, with no leading or trailing `/`s.
|
220
258
|
:param str issuer_ref: Reference to an existing issuer.
|
221
259
|
:param str namespace: The namespace of the target resource.
|
222
260
|
The value should not contain leading or trailing forward slashes.
|
223
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
261
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
224
262
|
*Available only for Vault Enterprise*.
|
225
263
|
"""
|
226
|
-
|
264
|
+
__args__ = dict()
|
265
|
+
__args__['backend'] = backend
|
266
|
+
__args__['issuerRef'] = issuer_ref
|
267
|
+
__args__['namespace'] = namespace
|
268
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
|
+
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
|
+
backend=pulumi.get(__response__, 'backend'),
|
272
|
+
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
|
+
certificate=pulumi.get(__response__, 'certificate'),
|
274
|
+
id=pulumi.get(__response__, 'id'),
|
275
|
+
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
|
+
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
277
|
+
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
278
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
279
|
+
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
280
|
+
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
281
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
282
|
+
usage=pulumi.get(__response__, 'usage')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of issuer strings read from Vault.
|
62
67
|
"""
|
@@ -104,7 +109,6 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
104
109
|
"""
|
105
110
|
## Example Usage
|
106
111
|
|
107
|
-
<!--Start PulumiCodeChooser -->
|
108
112
|
```python
|
109
113
|
import pulumi
|
110
114
|
import pulumi_vault as vault
|
@@ -121,14 +125,13 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
121
125
|
issuer_name="example")
|
122
126
|
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
123
127
|
```
|
124
|
-
<!--End PulumiCodeChooser -->
|
125
128
|
|
126
129
|
|
127
130
|
:param str backend: The path to the PKI secret backend to
|
128
131
|
read the issuers from, with no leading or trailing `/`s.
|
129
132
|
:param str namespace: The namespace of the target resource.
|
130
133
|
The value should not contain leading or trailing forward slashes.
|
131
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
132
135
|
*Available only for Vault Enterprise*.
|
133
136
|
"""
|
134
137
|
__args__ = dict()
|
@@ -144,16 +147,12 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
144
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
145
148
|
keys=pulumi.get(__ret__, 'keys'),
|
146
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
147
|
-
|
148
|
-
|
149
|
-
@_utilities.lift_output_func(get_backend_issuers)
|
150
150
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
153
153
|
"""
|
154
154
|
## Example Usage
|
155
155
|
|
156
|
-
<!--Start PulumiCodeChooser -->
|
157
156
|
```python
|
158
157
|
import pulumi
|
159
158
|
import pulumi_vault as vault
|
@@ -170,14 +169,24 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
170
169
|
issuer_name="example")
|
171
170
|
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
172
171
|
```
|
173
|
-
<!--End PulumiCodeChooser -->
|
174
172
|
|
175
173
|
|
176
174
|
:param str backend: The path to the PKI secret backend to
|
177
175
|
read the issuers from, with no leading or trailing `/`s.
|
178
176
|
:param str namespace: The namespace of the target resource.
|
179
177
|
The value should not contain leading or trailing forward slashes.
|
180
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
179
|
*Available only for Vault Enterprise*.
|
182
180
|
"""
|
183
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -114,7 +119,6 @@ def get_backend_key(backend: Optional[str] = None,
|
|
114
119
|
"""
|
115
120
|
## Example Usage
|
116
121
|
|
117
|
-
<!--Start PulumiCodeChooser -->
|
118
122
|
```python
|
119
123
|
import pulumi
|
120
124
|
import pulumi_vault as vault
|
@@ -129,10 +133,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
129
133
|
key_name="example",
|
130
134
|
key_type="rsa",
|
131
135
|
key_bits=4096)
|
132
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
136
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
133
137
|
key_ref=key_id))
|
134
138
|
```
|
135
|
-
<!--End PulumiCodeChooser -->
|
136
139
|
|
137
140
|
|
138
141
|
:param str backend: The path to the PKI secret backend to
|
@@ -140,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
140
143
|
:param str key_ref: Reference to an existing key.
|
141
144
|
:param str namespace: The namespace of the target resource.
|
142
145
|
The value should not contain leading or trailing forward slashes.
|
143
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
144
147
|
*Available only for Vault Enterprise*.
|
145
148
|
"""
|
146
149
|
__args__ = dict()
|
@@ -158,17 +161,13 @@ def get_backend_key(backend: Optional[str] = None,
|
|
158
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
159
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
160
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
161
|
-
|
162
|
-
|
163
|
-
@_utilities.lift_output_func(get_backend_key)
|
164
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
166
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
167
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
|
167
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
168
168
|
"""
|
169
169
|
## Example Usage
|
170
170
|
|
171
|
-
<!--Start PulumiCodeChooser -->
|
172
171
|
```python
|
173
172
|
import pulumi
|
174
173
|
import pulumi_vault as vault
|
@@ -183,10 +182,9 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
183
182
|
key_name="example",
|
184
183
|
key_type="rsa",
|
185
184
|
key_bits=4096)
|
186
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
185
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
187
186
|
key_ref=key_id))
|
188
187
|
```
|
189
|
-
<!--End PulumiCodeChooser -->
|
190
188
|
|
191
189
|
|
192
190
|
:param str backend: The path to the PKI secret backend to
|
@@ -194,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
194
192
|
:param str key_ref: Reference to an existing key.
|
195
193
|
:param str namespace: The namespace of the target resource.
|
196
194
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
196
|
*Available only for Vault Enterprise*.
|
199
197
|
"""
|
200
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['keyRef'] = key_ref
|
201
|
+
__args__['namespace'] = namespace
|
202
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of key strings read from Vault.
|
62
67
|
"""
|
@@ -104,7 +109,6 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
104
109
|
"""
|
105
110
|
## Example Usage
|
106
111
|
|
107
|
-
<!--Start PulumiCodeChooser -->
|
108
112
|
```python
|
109
113
|
import pulumi
|
110
114
|
import pulumi_vault as vault
|
@@ -121,14 +125,13 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
121
125
|
key_name="example")
|
122
126
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
123
127
|
```
|
124
|
-
<!--End PulumiCodeChooser -->
|
125
128
|
|
126
129
|
|
127
130
|
:param str backend: The path to the PKI secret backend to
|
128
131
|
read the keys from, with no leading or trailing `/`s.
|
129
132
|
:param str namespace: The namespace of the target resource.
|
130
133
|
The value should not contain leading or trailing forward slashes.
|
131
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
132
135
|
*Available only for Vault Enterprise*.
|
133
136
|
"""
|
134
137
|
__args__ = dict()
|
@@ -144,16 +147,12 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
144
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
145
148
|
keys=pulumi.get(__ret__, 'keys'),
|
146
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
147
|
-
|
148
|
-
|
149
|
-
@_utilities.lift_output_func(get_backend_keys)
|
150
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
153
153
|
"""
|
154
154
|
## Example Usage
|
155
155
|
|
156
|
-
<!--Start PulumiCodeChooser -->
|
157
156
|
```python
|
158
157
|
import pulumi
|
159
158
|
import pulumi_vault as vault
|
@@ -170,14 +169,24 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
170
169
|
key_name="example")
|
171
170
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
172
171
|
```
|
173
|
-
<!--End PulumiCodeChooser -->
|
174
172
|
|
175
173
|
|
176
174
|
:param str backend: The path to the PKI secret backend to
|
177
175
|
read the keys from, with no leading or trailing `/`s.
|
178
176
|
:param str namespace: The namespace of the target resource.
|
179
177
|
The value should not contain leading or trailing forward slashes.
|
180
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
179
|
*Available only for Vault Enterprise*.
|
182
180
|
"""
|
183
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|