pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -4,38 +4,16 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendGroupArgs',
|
19
|
-
'AuthBackendGroupArgsDict',
|
20
14
|
'AuthBackendUserArgs',
|
21
|
-
'AuthBackendUserArgsDict',
|
22
15
|
]
|
23
16
|
|
24
|
-
MYPY = False
|
25
|
-
|
26
|
-
if not MYPY:
|
27
|
-
class AuthBackendGroupArgsDict(TypedDict):
|
28
|
-
group_name: pulumi.Input[str]
|
29
|
-
"""
|
30
|
-
Name of the Okta group
|
31
|
-
"""
|
32
|
-
policies: pulumi.Input[Sequence[pulumi.Input[str]]]
|
33
|
-
"""
|
34
|
-
Policies to associate with this group
|
35
|
-
"""
|
36
|
-
elif False:
|
37
|
-
AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
-
|
39
17
|
@pulumi.input_type
|
40
18
|
class AuthBackendGroupArgs:
|
41
19
|
def __init__(__self__, *,
|
@@ -73,23 +51,6 @@ class AuthBackendGroupArgs:
|
|
73
51
|
pulumi.set(self, "policies", value)
|
74
52
|
|
75
53
|
|
76
|
-
if not MYPY:
|
77
|
-
class AuthBackendUserArgsDict(TypedDict):
|
78
|
-
username: pulumi.Input[str]
|
79
|
-
"""
|
80
|
-
Name of the user within Okta
|
81
|
-
"""
|
82
|
-
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
83
|
-
"""
|
84
|
-
Groups within the Okta auth backend to associate with this user
|
85
|
-
"""
|
86
|
-
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
87
|
-
"""
|
88
|
-
Policies to associate with this user
|
89
|
-
"""
|
90
|
-
elif False:
|
91
|
-
AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
|
92
|
-
|
93
54
|
@pulumi.input_type
|
94
55
|
class AuthBackendUserArgs:
|
95
56
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from . import _utilities
|
16
11
|
|
17
12
|
__all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
@@ -4,46 +4,24 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'BackendConfigEstAuthenticatorsArgs',
|
19
|
-
'BackendConfigEstAuthenticatorsArgsDict',
|
20
14
|
'SecretBackendRolePolicyIdentifierArgs',
|
21
|
-
'SecretBackendRolePolicyIdentifierArgsDict',
|
22
15
|
]
|
23
16
|
|
24
|
-
MYPY = False
|
25
|
-
|
26
|
-
if not MYPY:
|
27
|
-
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
28
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
29
|
-
"""
|
30
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
-
"""
|
32
|
-
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
33
|
-
"""
|
34
|
-
"The accessor (required) property for user pass auth backends".
|
35
|
-
"""
|
36
|
-
elif False:
|
37
|
-
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
-
|
39
17
|
@pulumi.input_type
|
40
18
|
class BackendConfigEstAuthenticatorsArgs:
|
41
19
|
def __init__(__self__, *,
|
42
|
-
cert: Optional[pulumi.Input[Mapping[str,
|
43
|
-
userpass: Optional[pulumi.Input[Mapping[str,
|
20
|
+
cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
21
|
+
userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
44
22
|
"""
|
45
|
-
:param pulumi.Input[Mapping[str,
|
46
|
-
:param pulumi.Input[Mapping[str,
|
23
|
+
:param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
24
|
+
:param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
|
47
25
|
"""
|
48
26
|
if cert is not None:
|
49
27
|
pulumi.set(__self__, "cert", cert)
|
@@ -52,48 +30,29 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
52
30
|
|
53
31
|
@property
|
54
32
|
@pulumi.getter
|
55
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str,
|
33
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
56
34
|
"""
|
57
35
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
58
36
|
"""
|
59
37
|
return pulumi.get(self, "cert")
|
60
38
|
|
61
39
|
@cert.setter
|
62
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str,
|
40
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
63
41
|
pulumi.set(self, "cert", value)
|
64
42
|
|
65
43
|
@property
|
66
44
|
@pulumi.getter
|
67
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str,
|
45
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
68
46
|
"""
|
69
47
|
"The accessor (required) property for user pass auth backends".
|
70
48
|
"""
|
71
49
|
return pulumi.get(self, "userpass")
|
72
50
|
|
73
51
|
@userpass.setter
|
74
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str,
|
52
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
75
53
|
pulumi.set(self, "userpass", value)
|
76
54
|
|
77
55
|
|
78
|
-
if not MYPY:
|
79
|
-
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
80
|
-
oid: pulumi.Input[str]
|
81
|
-
"""
|
82
|
-
The OID for the policy identifier
|
83
|
-
"""
|
84
|
-
cps: NotRequired[pulumi.Input[str]]
|
85
|
-
"""
|
86
|
-
The URL of the CPS for the policy identifier
|
87
|
-
|
88
|
-
Example usage:
|
89
|
-
"""
|
90
|
-
notice: NotRequired[pulumi.Input[str]]
|
91
|
-
"""
|
92
|
-
A notice for the policy identifier
|
93
|
-
"""
|
94
|
-
elif False:
|
95
|
-
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
96
|
-
|
97
56
|
@pulumi.input_type
|
98
57
|
class SecretBackendRolePolicyIdentifierArgs:
|
99
58
|
def __init__(__self__, *,
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -28,7 +23,7 @@ class BackendConfigEstArgs:
|
|
28
23
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
29
24
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
30
25
|
enabled: Optional[pulumi.Input[bool]] = None,
|
31
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
26
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
32
27
|
namespace: Optional[pulumi.Input[str]] = None):
|
33
28
|
"""
|
34
29
|
The set of arguments for constructing a BackendConfigEst resource.
|
@@ -42,7 +37,7 @@ class BackendConfigEstArgs:
|
|
42
37
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
43
38
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
44
39
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
45
|
-
:param pulumi.Input[Mapping[str,
|
40
|
+
:param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
46
41
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
47
42
|
The value should not contain leading or trailing forward slashes.
|
48
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -155,14 +150,14 @@ class BackendConfigEstArgs:
|
|
155
150
|
|
156
151
|
@property
|
157
152
|
@pulumi.getter(name="labelToPathPolicy")
|
158
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
153
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
159
154
|
"""
|
160
155
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
161
156
|
"""
|
162
157
|
return pulumi.get(self, "label_to_path_policy")
|
163
158
|
|
164
159
|
@label_to_path_policy.setter
|
165
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
160
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
166
161
|
pulumi.set(self, "label_to_path_policy", value)
|
167
162
|
|
168
163
|
@property
|
@@ -191,7 +186,7 @@ class _BackendConfigEstState:
|
|
191
186
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
192
187
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
193
188
|
enabled: Optional[pulumi.Input[bool]] = None,
|
194
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
189
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
195
190
|
last_updated: Optional[pulumi.Input[str]] = None,
|
196
191
|
namespace: Optional[pulumi.Input[str]] = None):
|
197
192
|
"""
|
@@ -206,7 +201,7 @@ class _BackendConfigEstState:
|
|
206
201
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
207
202
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
208
203
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
209
|
-
:param pulumi.Input[Mapping[str,
|
204
|
+
:param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
210
205
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
211
206
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
212
207
|
The value should not contain leading or trailing forward slashes.
|
@@ -323,14 +318,14 @@ class _BackendConfigEstState:
|
|
323
318
|
|
324
319
|
@property
|
325
320
|
@pulumi.getter(name="labelToPathPolicy")
|
326
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str,
|
321
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
327
322
|
"""
|
328
323
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
329
324
|
"""
|
330
325
|
return pulumi.get(self, "label_to_path_policy")
|
331
326
|
|
332
327
|
@label_to_path_policy.setter
|
333
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str,
|
328
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
334
329
|
pulumi.set(self, "label_to_path_policy", value)
|
335
330
|
|
336
331
|
@property
|
@@ -373,7 +368,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
373
368
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
374
369
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
375
370
|
enabled: Optional[pulumi.Input[bool]] = None,
|
376
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
371
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
377
372
|
namespace: Optional[pulumi.Input[str]] = None,
|
378
373
|
__props__=None):
|
379
374
|
"""
|
@@ -401,7 +396,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
401
396
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
402
397
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
403
398
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
404
|
-
:param pulumi.Input[Mapping[str,
|
399
|
+
:param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
405
400
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
406
401
|
The value should not contain leading or trailing forward slashes.
|
407
402
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -448,7 +443,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
448
443
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
449
444
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
450
445
|
enabled: Optional[pulumi.Input[bool]] = None,
|
451
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
446
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
452
447
|
namespace: Optional[pulumi.Input[str]] = None,
|
453
448
|
__props__=None):
|
454
449
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -488,7 +483,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
488
483
|
default_path_policy: Optional[pulumi.Input[str]] = None,
|
489
484
|
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
490
485
|
enabled: Optional[pulumi.Input[bool]] = None,
|
491
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str,
|
486
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
492
487
|
last_updated: Optional[pulumi.Input[str]] = None,
|
493
488
|
namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigEst':
|
494
489
|
"""
|
@@ -508,7 +503,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
508
503
|
:param pulumi.Input[str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
509
504
|
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
510
505
|
:param pulumi.Input[bool] enabled: Specifies whether EST is enabled.
|
511
|
-
:param pulumi.Input[Mapping[str,
|
506
|
+
:param pulumi.Input[Mapping[str, Any]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
512
507
|
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
513
508
|
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
514
509
|
The value should not contain leading or trailing forward slashes.
|
@@ -592,7 +587,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
592
587
|
|
593
588
|
@property
|
594
589
|
@pulumi.getter(name="labelToPathPolicy")
|
595
|
-
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str,
|
590
|
+
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
596
591
|
"""
|
597
592
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
598
593
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
|
@@ -125,7 +120,7 @@ class GetBackendConfigEstResult:
|
|
125
120
|
|
126
121
|
@property
|
127
122
|
@pulumi.getter(name="labelToPathPolicy")
|
128
|
-
def label_to_path_policy(self) -> Mapping[str,
|
123
|
+
def label_to_path_policy(self) -> Mapping[str, Any]:
|
129
124
|
"""
|
130
125
|
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
131
126
|
"""
|
@@ -207,6 +202,9 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
207
202
|
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
208
203
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
204
|
namespace=pulumi.get(__ret__, 'namespace'))
|
205
|
+
|
206
|
+
|
207
|
+
@_utilities.lift_output_func(get_backend_config_est)
|
210
208
|
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
209
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
210
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
@@ -232,20 +230,4 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
|
232
230
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
231
|
*Available only for Vault Enterprise*.
|
234
232
|
"""
|
235
|
-
|
236
|
-
__args__['backend'] = backend
|
237
|
-
__args__['namespace'] = namespace
|
238
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
|
-
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
|
-
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
242
|
-
authenticators=pulumi.get(__response__, 'authenticators'),
|
243
|
-
backend=pulumi.get(__response__, 'backend'),
|
244
|
-
default_mount=pulumi.get(__response__, 'default_mount'),
|
245
|
-
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
246
|
-
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
247
|
-
enabled=pulumi.get(__response__, 'enabled'),
|
248
|
-
id=pulumi.get(__response__, 'id'),
|
249
|
-
label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
|
250
|
-
last_updated=pulumi.get(__response__, 'last_updated'),
|
251
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
233
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -227,6 +222,9 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
227
222
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
228
223
|
namespace=pulumi.get(__ret__, 'namespace'),
|
229
224
|
usage=pulumi.get(__ret__, 'usage'))
|
225
|
+
|
226
|
+
|
227
|
+
@_utilities.lift_output_func(get_backend_issuer)
|
230
228
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
231
229
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
232
230
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -261,22 +259,4 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
261
259
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
260
|
*Available only for Vault Enterprise*.
|
263
261
|
"""
|
264
|
-
|
265
|
-
__args__['backend'] = backend
|
266
|
-
__args__['issuerRef'] = issuer_ref
|
267
|
-
__args__['namespace'] = namespace
|
268
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
|
-
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
|
-
backend=pulumi.get(__response__, 'backend'),
|
272
|
-
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
|
-
certificate=pulumi.get(__response__, 'certificate'),
|
274
|
-
id=pulumi.get(__response__, 'id'),
|
275
|
-
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
|
-
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
277
|
-
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
278
|
-
key_id=pulumi.get(__response__, 'key_id'),
|
279
|
-
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
280
|
-
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
281
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
282
|
-
usage=pulumi.get(__response__, 'usage')))
|
262
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -61,7 +56,7 @@ class GetBackendIssuersResult:
|
|
61
56
|
|
62
57
|
@property
|
63
58
|
@pulumi.getter(name="keyInfo")
|
64
|
-
def key_info(self) -> Mapping[str,
|
59
|
+
def key_info(self) -> Mapping[str, Any]:
|
65
60
|
"""
|
66
61
|
Map of issuer strings read from Vault.
|
67
62
|
"""
|
@@ -147,6 +142,9 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
147
142
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
143
|
keys=pulumi.get(__ret__, 'keys'),
|
149
144
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
+
|
146
|
+
|
147
|
+
@_utilities.lift_output_func(get_backend_issuers)
|
150
148
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
149
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
150
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
@@ -178,15 +176,4 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
178
176
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
177
|
*Available only for Vault Enterprise*.
|
180
178
|
"""
|
181
|
-
|
182
|
-
__args__['backend'] = backend
|
183
|
-
__args__['namespace'] = namespace
|
184
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
|
-
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
|
-
backend=pulumi.get(__response__, 'backend'),
|
188
|
-
id=pulumi.get(__response__, 'id'),
|
189
|
-
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
-
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
-
keys=pulumi.get(__response__, 'keys'),
|
192
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
179
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -161,6 +156,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
161
156
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
162
157
|
key_type=pulumi.get(__ret__, 'key_type'),
|
163
158
|
namespace=pulumi.get(__ret__, 'namespace'))
|
159
|
+
|
160
|
+
|
161
|
+
@_utilities.lift_output_func(get_backend_key)
|
164
162
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
163
|
key_ref: Optional[pulumi.Input[str]] = None,
|
166
164
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -195,17 +193,4 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
195
193
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
194
|
*Available only for Vault Enterprise*.
|
197
195
|
"""
|
198
|
-
|
199
|
-
__args__['backend'] = backend
|
200
|
-
__args__['keyRef'] = key_ref
|
201
|
-
__args__['namespace'] = namespace
|
202
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
-
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
-
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
-
backend=pulumi.get(__response__, 'backend'),
|
206
|
-
id=pulumi.get(__response__, 'id'),
|
207
|
-
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
-
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
-
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
-
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
-
namespace=pulumi.get(__response__, 'namespace')))
|
196
|
+
...
|