pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -23,7 +28,7 @@ class BackendConfigEstArgs:
|
|
23
28
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
24
29
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
25
30
|
enabled: Optional[pulumi.Input[bool]] = None,
|
26
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
31
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
27
32
|
namespace: Optional[pulumi.Input[str]] = None):
|
28
33
|
"""
|
29
34
|
The set of arguments for constructing a BackendConfigEst resource.
|
@@ -37,7 +42,7 @@ class BackendConfigEstArgs:
|
|
37
42
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
38
43
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
39
44
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
40
|
-
:param pulumi.Input[Mapping[str,
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
41
46
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
42
47
|
The value should not contain leading or trailing forward slashes.
|
43
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -150,14 +155,14 @@ class BackendConfigEstArgs:
|
|
150
155
|
|
151
156
|
@property
|
152
157
|
@pulumi.getter(name="labelToPathPolicy")
|
153
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
158
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
154
159
|
"""
|
155
160
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
156
161
|
"""
|
157
162
|
return pulumi.get(self, "label_to_path_policy")
|
158
163
|
|
159
164
|
@label_to_path_policy.setter
|
160
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
165
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
161
166
|
pulumi.set(self, "label_to_path_policy", value)
|
162
167
|
|
163
168
|
@property
|
@@ -186,7 +191,7 @@ class _BackendConfigEstState:
|
|
186
191
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
187
192
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
188
193
|
enabled: Optional[pulumi.Input[bool]] = None,
|
189
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
194
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
190
195
|
last_updated: Optional[pulumi.Input[str]] = None,
|
191
196
|
namespace: Optional[pulumi.Input[str]] = None):
|
192
197
|
"""
|
@@ -201,7 +206,7 @@ class _BackendConfigEstState:
|
|
201
206
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
202
207
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
203
208
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
204
|
-
:param pulumi.Input[Mapping[str,
|
209
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
205
210
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
206
211
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
207
212
|
The value should not contain leading or trailing forward slashes.
|
@@ -318,14 +323,14 @@ class _BackendConfigEstState:
|
|
318
323
|
|
319
324
|
@property
|
320
325
|
@pulumi.getter(name="labelToPathPolicy")
|
321
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
326
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
322
327
|
"""
|
323
328
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
324
329
|
"""
|
325
330
|
return pulumi.get(self, "label_to_path_policy")
|
326
331
|
|
327
332
|
@label_to_path_policy.setter
|
328
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
333
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
329
334
|
pulumi.set(self, "label_to_path_policy", value)
|
330
335
|
|
331
336
|
@property
|
@@ -362,13 +367,13 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
362
367
|
resource_name: str,
|
363
368
|
opts: Optional[pulumi.ResourceOptions] = None,
|
364
369
|
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
365
|
-
authenticators: Optional[pulumi.Input[
|
370
|
+
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
366
371
|
backend: Optional[pulumi.Input[str]] = None,
|
367
372
|
default_mount: Optional[pulumi.Input[bool]] = None,
|
368
373
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
369
374
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
370
375
|
enabled: Optional[pulumi.Input[bool]] = None,
|
371
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
376
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
372
377
|
namespace: Optional[pulumi.Input[str]] = None,
|
373
378
|
__props__=None):
|
374
379
|
"""
|
@@ -389,14 +394,14 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
389
394
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
390
395
|
|
391
396
|
<a id="nestedatt--authenticators"></a>
|
392
|
-
:param pulumi.Input[
|
397
|
+
:param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
393
398
|
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
394
399
|
read the EST configuration from, with no leading or trailing `/`s.
|
395
400
|
:param pulumi.Input[bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
396
401
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
397
402
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
398
403
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
399
|
-
:param pulumi.Input[Mapping[str,
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
400
405
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
401
406
|
The value should not contain leading or trailing forward slashes.
|
402
407
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -437,13 +442,13 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
437
442
|
resource_name: str,
|
438
443
|
opts: Optional[pulumi.ResourceOptions] = None,
|
439
444
|
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
440
|
-
authenticators: Optional[pulumi.Input[
|
445
|
+
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
441
446
|
backend: Optional[pulumi.Input[str]] = None,
|
442
447
|
default_mount: Optional[pulumi.Input[bool]] = None,
|
443
448
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
444
449
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
445
450
|
enabled: Optional[pulumi.Input[bool]] = None,
|
446
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
451
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
447
452
|
namespace: Optional[pulumi.Input[str]] = None,
|
448
453
|
__props__=None):
|
449
454
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -477,13 +482,13 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
477
482
|
id: pulumi.Input[str],
|
478
483
|
opts: Optional[pulumi.ResourceOptions] = None,
|
479
484
|
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
480
|
-
authenticators: Optional[pulumi.Input[
|
485
|
+
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
481
486
|
backend: Optional[pulumi.Input[str]] = None,
|
482
487
|
default_mount: Optional[pulumi.Input[bool]] = None,
|
483
488
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
484
489
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
485
490
|
enabled: Optional[pulumi.Input[bool]] = None,
|
486
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
491
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
487
492
|
last_updated: Optional[pulumi.Input[str]] = None,
|
488
493
|
namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
|
489
494
|
"""
|
@@ -496,14 +501,14 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
496
501
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
497
502
|
|
498
503
|
<a id="nestedatt--authenticators"></a>
|
499
|
-
:param pulumi.Input[
|
504
|
+
:param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
500
505
|
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
501
506
|
read the EST configuration from, with no leading or trailing `/`s.
|
502
507
|
:param pulumi.Input[bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
503
508
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
504
509
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
505
510
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
506
|
-
:param pulumi.Input[Mapping[str,
|
511
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
507
512
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
508
513
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
509
514
|
The value should not contain leading or trailing forward slashes.
|
@@ -587,7 +592,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
587
592
|
|
588
593
|
@property
|
589
594
|
@pulumi.getter(name="labelToPathPolicy")
|
590
|
-
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str,
|
595
|
+
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
591
596
|
"""
|
592
597
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
593
598
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
@@ -120,7 +125,7 @@ class GetBackendConfigEstResult:
|
|
120
125
|
|
121
126
|
@property
|
122
127
|
@pulumi.getter(name="labelToPathPolicy")
|
123
|
-
def label_to_path_policy(self) -> Mapping[str,
|
128
|
+
def label_to_path_policy(self) -> Mapping[str, str]:
|
124
129
|
"""
|
125
130
|
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
126
131
|
"""
|
@@ -202,9 +207,6 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
202
207
|
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
203
208
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
204
209
|
namespace=pulumi.get(__ret__, 'namespace'))
|
205
|
-
|
206
|
-
|
207
|
-
@_utilities.lift_output_func(get_backend_config_est)
|
208
210
|
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
209
211
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
210
212
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
@@ -230,4 +232,20 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
|
230
232
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
231
233
|
*Available only for Vault Enterprise*.
|
232
234
|
"""
|
233
|
-
|
235
|
+
__args__ = dict()
|
236
|
+
__args__['backend'] = backend
|
237
|
+
__args__['namespace'] = namespace
|
238
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
|
+
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
|
+
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
242
|
+
authenticators=pulumi.get(__response__, 'authenticators'),
|
243
|
+
backend=pulumi.get(__response__, 'backend'),
|
244
|
+
default_mount=pulumi.get(__response__, 'default_mount'),
|
245
|
+
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
246
|
+
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
247
|
+
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
+
id=pulumi.get(__response__, 'id'),
|
249
|
+
label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
|
250
|
+
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -222,9 +227,6 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
222
227
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
223
228
|
namespace=pulumi.get(__ret__, 'namespace'),
|
224
229
|
usage=pulumi.get(__ret__, 'usage'))
|
225
|
-
|
226
|
-
|
227
|
-
@_utilities.lift_output_func(get_backend_issuer)
|
228
230
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
229
231
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
230
232
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -259,4 +261,22 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
259
261
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
260
262
|
*Available only for Vault Enterprise*.
|
261
263
|
"""
|
262
|
-
|
264
|
+
__args__ = dict()
|
265
|
+
__args__['backend'] = backend
|
266
|
+
__args__['issuerRef'] = issuer_ref
|
267
|
+
__args__['namespace'] = namespace
|
268
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
|
+
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
|
+
backend=pulumi.get(__response__, 'backend'),
|
272
|
+
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
|
+
certificate=pulumi.get(__response__, 'certificate'),
|
274
|
+
id=pulumi.get(__response__, 'id'),
|
275
|
+
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
|
+
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
277
|
+
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
278
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
279
|
+
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
280
|
+
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
281
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
282
|
+
usage=pulumi.get(__response__, 'usage')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of issuer strings read from Vault.
|
62
67
|
"""
|
@@ -142,9 +147,6 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
142
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
143
148
|
keys=pulumi.get(__ret__, 'keys'),
|
144
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
-
|
146
|
-
|
147
|
-
@_utilities.lift_output_func(get_backend_issuers)
|
148
150
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
149
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
150
152
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
@@ -176,4 +178,15 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
176
178
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
179
|
*Available only for Vault Enterprise*.
|
178
180
|
"""
|
179
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -156,9 +161,6 @@ def get_backend_key(backend: Optional[str] = None,
|
|
156
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
157
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
158
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
159
|
-
|
160
|
-
|
161
|
-
@_utilities.lift_output_func(get_backend_key)
|
162
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
163
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
164
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -193,4 +195,17 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
193
195
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
194
196
|
*Available only for Vault Enterprise*.
|
195
197
|
"""
|
196
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['keyRef'] = key_ref
|
201
|
+
__args__['namespace'] = namespace
|
202
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of key strings read from Vault.
|
62
67
|
"""
|
@@ -142,9 +147,6 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
142
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
143
148
|
keys=pulumi.get(__ret__, 'keys'),
|
144
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
-
|
146
|
-
|
147
|
-
@_utilities.lift_output_func(get_backend_keys)
|
148
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
149
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
150
152
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
@@ -176,4 +178,15 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
176
178
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
179
|
*Available only for Vault Enterprise*.
|
178
180
|
"""
|
179
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -18,11 +23,11 @@ __all__ = [
|
|
18
23
|
@pulumi.output_type
|
19
24
|
class BackendConfigEstAuthenticators(dict):
|
20
25
|
def __init__(__self__, *,
|
21
|
-
cert: Optional[Mapping[str,
|
22
|
-
userpass: Optional[Mapping[str,
|
26
|
+
cert: Optional[Mapping[str, str]] = None,
|
27
|
+
userpass: Optional[Mapping[str, str]] = None):
|
23
28
|
"""
|
24
|
-
:param Mapping[str,
|
25
|
-
:param Mapping[str,
|
29
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
30
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
26
31
|
"""
|
27
32
|
if cert is not None:
|
28
33
|
pulumi.set(__self__, "cert", cert)
|
@@ -31,7 +36,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
31
36
|
|
32
37
|
@property
|
33
38
|
@pulumi.getter
|
34
|
-
def cert(self) -> Optional[Mapping[str,
|
39
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
35
40
|
"""
|
36
41
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
37
42
|
"""
|
@@ -39,7 +44,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
39
44
|
|
40
45
|
@property
|
41
46
|
@pulumi.getter
|
42
|
-
def userpass(self) -> Optional[Mapping[str,
|
47
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
43
48
|
"""
|
44
49
|
"The accessor (required) property for user pass auth backends".
|
45
50
|
"""
|
@@ -95,11 +100,11 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
95
100
|
@pulumi.output_type
|
96
101
|
class GetBackendConfigEstAuthenticatorResult(dict):
|
97
102
|
def __init__(__self__, *,
|
98
|
-
cert: Optional[Mapping[str,
|
99
|
-
userpass: Optional[Mapping[str,
|
103
|
+
cert: Optional[Mapping[str, str]] = None,
|
104
|
+
userpass: Optional[Mapping[str, str]] = None):
|
100
105
|
"""
|
101
|
-
:param Mapping[str,
|
102
|
-
:param Mapping[str,
|
106
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
107
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
103
108
|
"""
|
104
109
|
if cert is not None:
|
105
110
|
pulumi.set(__self__, "cert", cert)
|
@@ -108,7 +113,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
108
113
|
|
109
114
|
@property
|
110
115
|
@pulumi.getter
|
111
|
-
def cert(self) -> Optional[Mapping[str,
|
116
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
112
117
|
"""
|
113
118
|
"The accessor and cert_role properties for cert auth backends".
|
114
119
|
"""
|
@@ -116,7 +121,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
116
121
|
|
117
122
|
@property
|
118
123
|
@pulumi.getter
|
119
|
-
def userpass(self) -> Optional[Mapping[str,
|
124
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
120
125
|
"""
|
121
126
|
"The accessor property for user pass auth backends".
|
122
127
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|