pulumi-vault 6.5.0__py3-none-any.whl → 6.5.0a1732603022__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -24
- pulumi_vault/ad/get_access_credentials.py +2 -2
- pulumi_vault/approle/get_auth_backend_role_id.py +2 -2
- pulumi_vault/aws/auth_backend_sts_role.py +0 -47
- pulumi_vault/aws/get_access_credentials.py +2 -2
- pulumi_vault/aws/get_static_access_credentials.py +2 -2
- pulumi_vault/aws/secret_backend.py +0 -141
- pulumi_vault/azure/get_access_credentials.py +2 -2
- pulumi_vault/database/_inputs.py +0 -40
- pulumi_vault/database/outputs.py +0 -28
- pulumi_vault/gcp/get_auth_backend_role.py +2 -2
- pulumi_vault/generic/get_secret.py +2 -2
- pulumi_vault/get_auth_backend.py +2 -2
- pulumi_vault/get_auth_backends.py +2 -2
- pulumi_vault/get_namespace.py +2 -2
- pulumi_vault/get_namespaces.py +2 -2
- pulumi_vault/get_nomad_access_token.py +2 -2
- pulumi_vault/get_policy_document.py +2 -2
- pulumi_vault/get_raft_autopilot_state.py +2 -2
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/identity/get_group.py +2 -2
- pulumi_vault/identity/get_oidc_client_creds.py +2 -2
- pulumi_vault/identity/get_oidc_openid_config.py +2 -2
- pulumi_vault/identity/get_oidc_public_keys.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_config.py +2 -2
- pulumi_vault/kubernetes/get_auth_backend_role.py +2 -2
- pulumi_vault/kubernetes/get_service_account_token.py +2 -2
- pulumi_vault/kv/get_secret.py +2 -2
- pulumi_vault/kv/get_secret_subkeys_v2.py +2 -2
- pulumi_vault/kv/get_secret_v2.py +2 -2
- pulumi_vault/kv/get_secrets_list.py +2 -2
- pulumi_vault/kv/get_secrets_list_v2.py +2 -2
- pulumi_vault/ldap/get_dynamic_credentials.py +2 -2
- pulumi_vault/ldap/get_static_credentials.py +2 -2
- pulumi_vault/pkisecret/__init__.py +0 -4
- pulumi_vault/pkisecret/_inputs.py +0 -34
- pulumi_vault/pkisecret/get_backend_config_est.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +2 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +2 -2
- pulumi_vault/pkisecret/get_backend_key.py +2 -2
- pulumi_vault/pkisecret/get_backend_keys.py +2 -2
- pulumi_vault/pkisecret/outputs.py +0 -40
- pulumi_vault/pkisecret/secret_backend_role.py +0 -47
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/secret_backend_role.py +0 -27
- pulumi_vault/transform/get_decode.py +2 -2
- pulumi_vault/transform/get_encode.py +2 -2
- pulumi_vault/transit/get_decrypt.py +2 -2
- pulumi_vault/transit/get_encrypt.py +2 -2
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/METADATA +4 -4
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/RECORD +53 -57
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_acme_eab.py +0 -549
- pulumi_vault/pkisecret/backend_config_acme.py +0 -642
- pulumi_vault/pkisecret/backend_config_cmpv2.py +0 -525
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +0 -209
- {pulumi_vault-6.5.0.dist-info → pulumi_vault-6.5.0a1732603022.dist-info}/top_level.txt +0 -0
@@ -209,7 +209,7 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
209
209
|
namespace=pulumi.get(__ret__, 'namespace'))
|
210
210
|
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
211
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
212
|
-
opts: Optional[
|
212
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
213
213
|
"""
|
214
214
|
## Example Usage
|
215
215
|
|
@@ -235,7 +235,7 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
|
235
235
|
__args__ = dict()
|
236
236
|
__args__['backend'] = backend
|
237
237
|
__args__['namespace'] = namespace
|
238
|
-
opts = pulumi.
|
238
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
239
239
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
|
240
240
|
return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
|
241
241
|
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
@@ -230,7 +230,7 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
230
230
|
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
231
231
|
issuer_ref: Optional[pulumi.Input[str]] = None,
|
232
232
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
233
|
-
opts: Optional[
|
233
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
234
234
|
"""
|
235
235
|
## Example Usage
|
236
236
|
|
@@ -265,7 +265,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
265
265
|
__args__['backend'] = backend
|
266
266
|
__args__['issuerRef'] = issuer_ref
|
267
267
|
__args__['namespace'] = namespace
|
268
|
-
opts = pulumi.
|
268
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
269
269
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
270
270
|
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
271
271
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -149,7 +149,7 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
149
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
150
|
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
opts: Optional[
|
152
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
153
153
|
"""
|
154
154
|
## Example Usage
|
155
155
|
|
@@ -181,7 +181,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
181
181
|
__args__ = dict()
|
182
182
|
__args__['backend'] = backend
|
183
183
|
__args__['namespace'] = namespace
|
184
|
-
opts = pulumi.
|
184
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
185
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
186
186
|
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
187
187
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -164,7 +164,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
164
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
166
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
167
|
-
opts: Optional[
|
167
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
|
168
168
|
"""
|
169
169
|
## Example Usage
|
170
170
|
|
@@ -199,7 +199,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
199
199
|
__args__['backend'] = backend
|
200
200
|
__args__['keyRef'] = key_ref
|
201
201
|
__args__['namespace'] = namespace
|
202
|
-
opts = pulumi.
|
202
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
203
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
204
|
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
205
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -149,7 +149,7 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
149
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
opts: Optional[
|
152
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
153
153
|
"""
|
154
154
|
## Example Usage
|
155
155
|
|
@@ -181,7 +181,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
181
181
|
__args__ = dict()
|
182
182
|
__args__['backend'] = backend
|
183
183
|
__args__['namespace'] = namespace
|
184
|
-
opts = pulumi.
|
184
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
185
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
186
|
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
187
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -15,32 +15,11 @@ else:
|
|
15
15
|
from .. import _utilities
|
16
16
|
|
17
17
|
__all__ = [
|
18
|
-
'BackendConfigCmpv2Authenticators',
|
19
18
|
'BackendConfigEstAuthenticators',
|
20
19
|
'SecretBackendRolePolicyIdentifier',
|
21
|
-
'GetBackendConfigCmpv2AuthenticatorResult',
|
22
20
|
'GetBackendConfigEstAuthenticatorResult',
|
23
21
|
]
|
24
22
|
|
25
|
-
@pulumi.output_type
|
26
|
-
class BackendConfigCmpv2Authenticators(dict):
|
27
|
-
def __init__(__self__, *,
|
28
|
-
cert: Optional[Mapping[str, str]] = None):
|
29
|
-
"""
|
30
|
-
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
-
"""
|
32
|
-
if cert is not None:
|
33
|
-
pulumi.set(__self__, "cert", cert)
|
34
|
-
|
35
|
-
@property
|
36
|
-
@pulumi.getter
|
37
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
38
|
-
"""
|
39
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
40
|
-
"""
|
41
|
-
return pulumi.get(self, "cert")
|
42
|
-
|
43
|
-
|
44
23
|
@pulumi.output_type
|
45
24
|
class BackendConfigEstAuthenticators(dict):
|
46
25
|
def __init__(__self__, *,
|
@@ -118,25 +97,6 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
118
97
|
return pulumi.get(self, "notice")
|
119
98
|
|
120
99
|
|
121
|
-
@pulumi.output_type
|
122
|
-
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
123
|
-
def __init__(__self__, *,
|
124
|
-
cert: Optional[Mapping[str, str]] = None):
|
125
|
-
"""
|
126
|
-
:param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
|
127
|
-
"""
|
128
|
-
if cert is not None:
|
129
|
-
pulumi.set(__self__, "cert", cert)
|
130
|
-
|
131
|
-
@property
|
132
|
-
@pulumi.getter
|
133
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
134
|
-
"""
|
135
|
-
The accessor and cert_role properties for cert auth backends
|
136
|
-
"""
|
137
|
-
return pulumi.get(self, "cert")
|
138
|
-
|
139
|
-
|
140
100
|
@pulumi.output_type
|
141
101
|
class GetBackendConfigEstAuthenticatorResult(dict):
|
142
102
|
def __init__(__self__, *,
|
@@ -38,7 +38,6 @@ class SecretBackendRoleArgs:
|
|
38
38
|
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
39
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
40
40
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
41
|
-
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
42
41
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
43
42
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
44
43
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -87,7 +86,6 @@ class SecretBackendRoleArgs:
|
|
87
86
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
|
88
87
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
89
88
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
90
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
91
89
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
92
90
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
93
91
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -160,8 +158,6 @@ class SecretBackendRoleArgs:
|
|
160
158
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
161
159
|
if client_flag is not None:
|
162
160
|
pulumi.set(__self__, "client_flag", client_flag)
|
163
|
-
if cn_validations is not None:
|
164
|
-
pulumi.set(__self__, "cn_validations", cn_validations)
|
165
161
|
if code_signing_flag is not None:
|
166
162
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
167
163
|
if countries is not None:
|
@@ -425,18 +421,6 @@ class SecretBackendRoleArgs:
|
|
425
421
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
426
422
|
pulumi.set(self, "client_flag", value)
|
427
423
|
|
428
|
-
@property
|
429
|
-
@pulumi.getter(name="cnValidations")
|
430
|
-
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
431
|
-
"""
|
432
|
-
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
433
|
-
"""
|
434
|
-
return pulumi.get(self, "cn_validations")
|
435
|
-
|
436
|
-
@cn_validations.setter
|
437
|
-
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
438
|
-
pulumi.set(self, "cn_validations", value)
|
439
|
-
|
440
424
|
@property
|
441
425
|
@pulumi.getter(name="codeSigningFlag")
|
442
426
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -815,7 +799,6 @@ class _SecretBackendRoleState:
|
|
815
799
|
backend: Optional[pulumi.Input[str]] = None,
|
816
800
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
817
801
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
818
|
-
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
819
802
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
820
803
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
821
804
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -864,7 +847,6 @@ class _SecretBackendRoleState:
|
|
864
847
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
865
848
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
866
849
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
867
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
868
850
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
869
851
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
870
852
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -938,8 +920,6 @@ class _SecretBackendRoleState:
|
|
938
920
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
939
921
|
if client_flag is not None:
|
940
922
|
pulumi.set(__self__, "client_flag", client_flag)
|
941
|
-
if cn_validations is not None:
|
942
|
-
pulumi.set(__self__, "cn_validations", cn_validations)
|
943
923
|
if code_signing_flag is not None:
|
944
924
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
945
925
|
if countries is not None:
|
@@ -1203,18 +1183,6 @@ class _SecretBackendRoleState:
|
|
1203
1183
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
1204
1184
|
pulumi.set(self, "client_flag", value)
|
1205
1185
|
|
1206
|
-
@property
|
1207
|
-
@pulumi.getter(name="cnValidations")
|
1208
|
-
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1209
|
-
"""
|
1210
|
-
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1211
|
-
"""
|
1212
|
-
return pulumi.get(self, "cn_validations")
|
1213
|
-
|
1214
|
-
@cn_validations.setter
|
1215
|
-
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1216
|
-
pulumi.set(self, "cn_validations", value)
|
1217
|
-
|
1218
1186
|
@property
|
1219
1187
|
@pulumi.getter(name="codeSigningFlag")
|
1220
1188
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1595,7 +1563,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1595
1563
|
backend: Optional[pulumi.Input[str]] = None,
|
1596
1564
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1597
1565
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1598
|
-
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1599
1566
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1600
1567
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1601
1568
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1681,7 +1648,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1681
1648
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1682
1649
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1683
1650
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1684
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1685
1651
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1686
1652
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1687
1653
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -1795,7 +1761,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1795
1761
|
backend: Optional[pulumi.Input[str]] = None,
|
1796
1762
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1797
1763
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1798
|
-
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1799
1764
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1800
1765
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1801
1766
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1853,7 +1818,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1853
1818
|
__props__.__dict__["backend"] = backend
|
1854
1819
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
1855
1820
|
__props__.__dict__["client_flag"] = client_flag
|
1856
|
-
__props__.__dict__["cn_validations"] = cn_validations
|
1857
1821
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
1858
1822
|
__props__.__dict__["countries"] = countries
|
1859
1823
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -1910,7 +1874,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1910
1874
|
backend: Optional[pulumi.Input[str]] = None,
|
1911
1875
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1912
1876
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1913
|
-
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1914
1877
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1915
1878
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1916
1879
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1964,7 +1927,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1964
1927
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1965
1928
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1966
1929
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1967
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1968
1930
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1969
1931
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1970
1932
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -2025,7 +1987,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2025
1987
|
__props__.__dict__["backend"] = backend
|
2026
1988
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
2027
1989
|
__props__.__dict__["client_flag"] = client_flag
|
2028
|
-
__props__.__dict__["cn_validations"] = cn_validations
|
2029
1990
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
2030
1991
|
__props__.__dict__["countries"] = countries
|
2031
1992
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -2193,14 +2154,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2193
2154
|
"""
|
2194
2155
|
return pulumi.get(self, "client_flag")
|
2195
2156
|
|
2196
|
-
@property
|
2197
|
-
@pulumi.getter(name="cnValidations")
|
2198
|
-
def cn_validations(self) -> pulumi.Output[Sequence[str]]:
|
2199
|
-
"""
|
2200
|
-
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
2201
|
-
"""
|
2202
|
-
return pulumi.get(self, "cn_validations")
|
2203
|
-
|
2204
2157
|
@property
|
2205
2158
|
@pulumi.getter(name="codeSigningFlag")
|
2206
2159
|
def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -54,9 +54,6 @@ class SecretBackendRoleArgs:
|
|
54
54
|
:param pulumi.Input[str] key_type: Specifies the type of credentials generated by this role. This can be either `otp`, `dynamic` or `ca`.
|
55
55
|
:param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
|
56
56
|
:param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
|
57
|
-
:param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
|
58
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
59
|
-
only. The default of false is highly recommended.
|
60
57
|
:param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
|
61
58
|
:param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
|
62
59
|
:param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
|
@@ -190,11 +187,6 @@ class SecretBackendRoleArgs:
|
|
190
187
|
@property
|
191
188
|
@pulumi.getter(name="allowEmptyPrincipals")
|
192
189
|
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
193
|
-
"""
|
194
|
-
Allow signing certificates with no
|
195
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
196
|
-
only. The default of false is highly recommended.
|
197
|
-
"""
|
198
190
|
return pulumi.get(self, "allow_empty_principals")
|
199
191
|
|
200
192
|
@allow_empty_principals.setter
|
@@ -506,9 +498,6 @@ class _SecretBackendRoleState:
|
|
506
498
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
507
499
|
:param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
|
508
500
|
:param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
|
509
|
-
:param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
|
510
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
511
|
-
only. The default of false is highly recommended.
|
512
501
|
:param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
|
513
502
|
:param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
|
514
503
|
:param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
|
@@ -622,11 +611,6 @@ class _SecretBackendRoleState:
|
|
622
611
|
@property
|
623
612
|
@pulumi.getter(name="allowEmptyPrincipals")
|
624
613
|
def allow_empty_principals(self) -> Optional[pulumi.Input[bool]]:
|
625
|
-
"""
|
626
|
-
Allow signing certificates with no
|
627
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
628
|
-
only. The default of false is highly recommended.
|
629
|
-
"""
|
630
614
|
return pulumi.get(self, "allow_empty_principals")
|
631
615
|
|
632
616
|
@allow_empty_principals.setter
|
@@ -998,9 +982,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
998
982
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
999
983
|
:param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
|
1000
984
|
:param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
|
1001
|
-
:param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
|
1002
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
1003
|
-
only. The default of false is highly recommended.
|
1004
985
|
:param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
|
1005
986
|
:param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
|
1006
987
|
:param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
|
@@ -1199,9 +1180,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1199
1180
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1200
1181
|
:param pulumi.Input[str] algorithm_signer: When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
|
1201
1182
|
:param pulumi.Input[bool] allow_bare_domains: Specifies if host certificates that are requested are allowed to use the base domains listed in `allowed_domains`.
|
1202
|
-
:param pulumi.Input[bool] allow_empty_principals: Allow signing certificates with no
|
1203
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
1204
|
-
only. The default of false is highly recommended.
|
1205
1183
|
:param pulumi.Input[bool] allow_host_certificates: Specifies if certificates are allowed to be signed for use as a 'host'.
|
1206
1184
|
:param pulumi.Input[bool] allow_subdomains: Specifies if host certificates that are requested are allowed to be subdomains of those listed in `allowed_domains`.
|
1207
1185
|
:param pulumi.Input[bool] allow_user_certificates: Specifies if certificates are allowed to be signed for use as a 'user'.
|
@@ -1285,11 +1263,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1285
1263
|
@property
|
1286
1264
|
@pulumi.getter(name="allowEmptyPrincipals")
|
1287
1265
|
def allow_empty_principals(self) -> pulumi.Output[Optional[bool]]:
|
1288
|
-
"""
|
1289
|
-
Allow signing certificates with no
|
1290
|
-
valid principals (e.g. any valid principal). For backwards compatibility
|
1291
|
-
only. The default of false is highly recommended.
|
1292
|
-
"""
|
1293
1266
|
return pulumi.get(self, "allow_empty_principals")
|
1294
1267
|
|
1295
1268
|
@property
|
@@ -217,7 +217,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
217
217
|
transformation: Optional[pulumi.Input[Optional[str]]] = None,
|
218
218
|
tweak: Optional[pulumi.Input[Optional[str]]] = None,
|
219
219
|
value: Optional[pulumi.Input[Optional[str]]] = None,
|
220
|
-
opts: Optional[
|
220
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecodeResult]:
|
221
221
|
"""
|
222
222
|
This data source supports the "/transform/decode/{role_name}" Vault endpoint.
|
223
223
|
|
@@ -272,7 +272,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
272
272
|
__args__['transformation'] = transformation
|
273
273
|
__args__['tweak'] = tweak
|
274
274
|
__args__['value'] = value
|
275
|
-
opts = pulumi.
|
275
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
276
276
|
__ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult)
|
277
277
|
return __ret__.apply(lambda __response__: GetDecodeResult(
|
278
278
|
batch_inputs=pulumi.get(__response__, 'batch_inputs'),
|
@@ -219,7 +219,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
219
219
|
transformation: Optional[pulumi.Input[Optional[str]]] = None,
|
220
220
|
tweak: Optional[pulumi.Input[Optional[str]]] = None,
|
221
221
|
value: Optional[pulumi.Input[Optional[str]]] = None,
|
222
|
-
opts: Optional[
|
222
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncodeResult]:
|
223
223
|
"""
|
224
224
|
This data source supports the "/transform/encode/{role_name}" Vault endpoint.
|
225
225
|
|
@@ -276,7 +276,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
276
276
|
__args__['transformation'] = transformation
|
277
277
|
__args__['tweak'] = tweak
|
278
278
|
__args__['value'] = value
|
279
|
-
opts = pulumi.
|
279
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
280
280
|
__ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult)
|
281
281
|
return __ret__.apply(lambda __response__: GetEncodeResult(
|
282
282
|
batch_inputs=pulumi.get(__response__, 'batch_inputs'),
|
@@ -148,7 +148,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
148
148
|
context: Optional[pulumi.Input[Optional[str]]] = None,
|
149
149
|
key: Optional[pulumi.Input[str]] = None,
|
150
150
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
151
|
-
opts: Optional[
|
151
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecryptResult]:
|
152
152
|
"""
|
153
153
|
This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
|
154
154
|
|
@@ -169,7 +169,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
169
169
|
__args__['context'] = context
|
170
170
|
__args__['key'] = key
|
171
171
|
__args__['namespace'] = namespace
|
172
|
-
opts = pulumi.
|
172
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
173
173
|
__ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult)
|
174
174
|
return __ret__.apply(lambda __response__: GetDecryptResult(
|
175
175
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -150,7 +150,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
150
150
|
key_version: Optional[pulumi.Input[Optional[int]]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
152
|
plaintext: Optional[pulumi.Input[str]] = None,
|
153
|
-
opts: Optional[
|
153
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncryptResult]:
|
154
154
|
"""
|
155
155
|
This is a data source which can be used to encrypt plaintext using a Vault Transit key.
|
156
156
|
"""
|
@@ -161,7 +161,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
|
161
161
|
__args__['keyVersion'] = key_version
|
162
162
|
__args__['namespace'] = namespace
|
163
163
|
__args__['plaintext'] = plaintext
|
164
|
-
opts = pulumi.
|
164
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
165
165
|
__ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult)
|
166
166
|
return __ret__.apply(lambda __response__: GetEncryptResult(
|
167
167
|
backend=pulumi.get(__response__, 'backend'),
|
@@ -1,15 +1,15 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_vault
|
3
|
-
Version: 6.5.
|
3
|
+
Version: 6.5.0a1732603022
|
4
4
|
Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-vault
|
8
8
|
Keywords: pulumi,vault
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.8
|
10
10
|
Description-Content-Type: text/markdown
|
11
11
|
Requires-Dist: parver>=0.2.1
|
12
|
-
Requires-Dist: pulumi<4.0.0,>=3.
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.136.0
|
13
13
|
Requires-Dist: semver>=2.8.1
|
14
14
|
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
15
15
|
|