pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +32 -0
- pulumi_vault/_utilities.py +8 -4
- pulumi_vault/aws/auth_backend_client.py +228 -4
- pulumi_vault/aws/auth_backend_sts_role.py +47 -0
- pulumi_vault/aws/secret_backend.py +395 -38
- pulumi_vault/aws/secret_backend_static_role.py +217 -0
- pulumi_vault/azure/auth_backend_config.py +257 -5
- pulumi_vault/azure/backend.py +249 -4
- pulumi_vault/database/_inputs.py +1740 -44
- pulumi_vault/database/outputs.py +1198 -18
- pulumi_vault/database/secret_backend_connection.py +220 -0
- pulumi_vault/database/secret_backend_static_role.py +143 -1
- pulumi_vault/database/secrets_mount.py +8 -0
- pulumi_vault/gcp/auth_backend.py +222 -2
- pulumi_vault/gcp/secret_backend.py +244 -4
- pulumi_vault/ldap/auth_backend.py +222 -2
- pulumi_vault/ldap/secret_backend.py +222 -2
- pulumi_vault/pkisecret/__init__.py +6 -0
- pulumi_vault/pkisecret/_inputs.py +34 -6
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +689 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +572 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
- pulumi_vault/pkisecret/outputs.py +40 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
- pulumi_vault/pkisecret/secret_backend_role.py +299 -3
- pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
- pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/secret_backend_role.py +27 -0
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/transit/__init__.py +2 -0
- pulumi_vault/transit/get_sign.py +324 -0
- pulumi_vault/transit/get_verify.py +354 -0
- pulumi_vault/transit/secret_backend_key.py +162 -0
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/RECORD +48 -39
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,277 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
|
17
|
+
__all__ = [
|
18
|
+
'GetBackendCertMetadataResult',
|
19
|
+
'AwaitableGetBackendCertMetadataResult',
|
20
|
+
'get_backend_cert_metadata',
|
21
|
+
'get_backend_cert_metadata_output',
|
22
|
+
]
|
23
|
+
|
24
|
+
@pulumi.output_type
|
25
|
+
class GetBackendCertMetadataResult:
|
26
|
+
"""
|
27
|
+
A collection of values returned by getBackendCertMetadata.
|
28
|
+
"""
|
29
|
+
def __init__(__self__, cert_metadata=None, expiration=None, id=None, issuer_id=None, namespace=None, path=None, role=None, serial=None, serial_number=None):
|
30
|
+
if cert_metadata and not isinstance(cert_metadata, str):
|
31
|
+
raise TypeError("Expected argument 'cert_metadata' to be a str")
|
32
|
+
pulumi.set(__self__, "cert_metadata", cert_metadata)
|
33
|
+
if expiration and not isinstance(expiration, str):
|
34
|
+
raise TypeError("Expected argument 'expiration' to be a str")
|
35
|
+
pulumi.set(__self__, "expiration", expiration)
|
36
|
+
if id and not isinstance(id, str):
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
38
|
+
pulumi.set(__self__, "id", id)
|
39
|
+
if issuer_id and not isinstance(issuer_id, str):
|
40
|
+
raise TypeError("Expected argument 'issuer_id' to be a str")
|
41
|
+
pulumi.set(__self__, "issuer_id", issuer_id)
|
42
|
+
if namespace and not isinstance(namespace, str):
|
43
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
44
|
+
pulumi.set(__self__, "namespace", namespace)
|
45
|
+
if path and not isinstance(path, str):
|
46
|
+
raise TypeError("Expected argument 'path' to be a str")
|
47
|
+
pulumi.set(__self__, "path", path)
|
48
|
+
if role and not isinstance(role, str):
|
49
|
+
raise TypeError("Expected argument 'role' to be a str")
|
50
|
+
pulumi.set(__self__, "role", role)
|
51
|
+
if serial and not isinstance(serial, str):
|
52
|
+
raise TypeError("Expected argument 'serial' to be a str")
|
53
|
+
pulumi.set(__self__, "serial", serial)
|
54
|
+
if serial_number and not isinstance(serial_number, str):
|
55
|
+
raise TypeError("Expected argument 'serial_number' to be a str")
|
56
|
+
pulumi.set(__self__, "serial_number", serial_number)
|
57
|
+
|
58
|
+
@property
|
59
|
+
@pulumi.getter(name="certMetadata")
|
60
|
+
def cert_metadata(self) -> str:
|
61
|
+
"""
|
62
|
+
The metadata associated with the certificate
|
63
|
+
"""
|
64
|
+
return pulumi.get(self, "cert_metadata")
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter
|
68
|
+
def expiration(self) -> str:
|
69
|
+
"""
|
70
|
+
The expiration date of the certificate in unix epoch format
|
71
|
+
"""
|
72
|
+
return pulumi.get(self, "expiration")
|
73
|
+
|
74
|
+
@property
|
75
|
+
@pulumi.getter
|
76
|
+
def id(self) -> str:
|
77
|
+
"""
|
78
|
+
The provider-assigned unique ID for this managed resource.
|
79
|
+
"""
|
80
|
+
return pulumi.get(self, "id")
|
81
|
+
|
82
|
+
@property
|
83
|
+
@pulumi.getter(name="issuerId")
|
84
|
+
def issuer_id(self) -> str:
|
85
|
+
"""
|
86
|
+
ID of the issuer.
|
87
|
+
"""
|
88
|
+
return pulumi.get(self, "issuer_id")
|
89
|
+
|
90
|
+
@property
|
91
|
+
@pulumi.getter
|
92
|
+
def namespace(self) -> Optional[str]:
|
93
|
+
return pulumi.get(self, "namespace")
|
94
|
+
|
95
|
+
@property
|
96
|
+
@pulumi.getter
|
97
|
+
def path(self) -> str:
|
98
|
+
return pulumi.get(self, "path")
|
99
|
+
|
100
|
+
@property
|
101
|
+
@pulumi.getter
|
102
|
+
def role(self) -> str:
|
103
|
+
"""
|
104
|
+
The role used to create the certificate
|
105
|
+
"""
|
106
|
+
return pulumi.get(self, "role")
|
107
|
+
|
108
|
+
@property
|
109
|
+
@pulumi.getter
|
110
|
+
def serial(self) -> str:
|
111
|
+
return pulumi.get(self, "serial")
|
112
|
+
|
113
|
+
@property
|
114
|
+
@pulumi.getter(name="serialNumber")
|
115
|
+
def serial_number(self) -> str:
|
116
|
+
"""
|
117
|
+
The serial number
|
118
|
+
"""
|
119
|
+
return pulumi.get(self, "serial_number")
|
120
|
+
|
121
|
+
|
122
|
+
class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
|
123
|
+
# pylint: disable=using-constant-test
|
124
|
+
def __await__(self):
|
125
|
+
if False:
|
126
|
+
yield self
|
127
|
+
return GetBackendCertMetadataResult(
|
128
|
+
cert_metadata=self.cert_metadata,
|
129
|
+
expiration=self.expiration,
|
130
|
+
id=self.id,
|
131
|
+
issuer_id=self.issuer_id,
|
132
|
+
namespace=self.namespace,
|
133
|
+
path=self.path,
|
134
|
+
role=self.role,
|
135
|
+
serial=self.serial,
|
136
|
+
serial_number=self.serial_number)
|
137
|
+
|
138
|
+
|
139
|
+
def get_backend_cert_metadata(namespace: Optional[str] = None,
|
140
|
+
path: Optional[str] = None,
|
141
|
+
serial: Optional[str] = None,
|
142
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
|
143
|
+
"""
|
144
|
+
## Example Usage
|
145
|
+
|
146
|
+
```python
|
147
|
+
import pulumi
|
148
|
+
import pulumi_vault as vault
|
149
|
+
|
150
|
+
pki = vault.Mount("pki",
|
151
|
+
path="pki",
|
152
|
+
type="pki",
|
153
|
+
description="PKI secret engine mount")
|
154
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
155
|
+
backend=pki.path,
|
156
|
+
type="internal",
|
157
|
+
common_name="example",
|
158
|
+
ttl="86400",
|
159
|
+
issuer_name="example")
|
160
|
+
test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
|
161
|
+
backend=test_vault_pki_secret_backend_root_cert["backend"],
|
162
|
+
name="test",
|
163
|
+
allowed_domains=["test.my.domain"],
|
164
|
+
allow_subdomains=True,
|
165
|
+
max_ttl="3600",
|
166
|
+
key_usages=[
|
167
|
+
"DigitalSignature",
|
168
|
+
"KeyAgreement",
|
169
|
+
"KeyEncipherment",
|
170
|
+
],
|
171
|
+
no_store_metadata=False)
|
172
|
+
test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
|
173
|
+
backend=test_secret_backend_role.backend,
|
174
|
+
name=test_secret_backend_role.name,
|
175
|
+
common_name="cert.test.my.domain",
|
176
|
+
ttl="720h",
|
177
|
+
min_seconds_remaining=60,
|
178
|
+
cert_metadata="dGVzdCBtZXRhZGF0YQ==")
|
179
|
+
test = test_secret_backend_cert.serial_number.apply(lambda serial_number: vault.pkiSecret.get_backend_cert_metadata_output(path=test_root["path"],
|
180
|
+
serial=serial_number))
|
181
|
+
```
|
182
|
+
|
183
|
+
|
184
|
+
:param str namespace: The namespace of the target resource.
|
185
|
+
The value should not contain leading or trailing forward slashes.
|
186
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
187
|
+
*Available only for Vault Enterprise*.
|
188
|
+
:param str path: The path to the PKI secret backend to
|
189
|
+
read the cert metadata from, with no leading or trailing `/`s.
|
190
|
+
:param str serial: Specifies the serial of the certificate whose metadata to read.
|
191
|
+
"""
|
192
|
+
__args__ = dict()
|
193
|
+
__args__['namespace'] = namespace
|
194
|
+
__args__['path'] = path
|
195
|
+
__args__['serial'] = serial
|
196
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
197
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendCertMetadata:getBackendCertMetadata', __args__, opts=opts, typ=GetBackendCertMetadataResult).value
|
198
|
+
|
199
|
+
return AwaitableGetBackendCertMetadataResult(
|
200
|
+
cert_metadata=pulumi.get(__ret__, 'cert_metadata'),
|
201
|
+
expiration=pulumi.get(__ret__, 'expiration'),
|
202
|
+
id=pulumi.get(__ret__, 'id'),
|
203
|
+
issuer_id=pulumi.get(__ret__, 'issuer_id'),
|
204
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
205
|
+
path=pulumi.get(__ret__, 'path'),
|
206
|
+
role=pulumi.get(__ret__, 'role'),
|
207
|
+
serial=pulumi.get(__ret__, 'serial'),
|
208
|
+
serial_number=pulumi.get(__ret__, 'serial_number'))
|
209
|
+
def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
210
|
+
path: Optional[pulumi.Input[str]] = None,
|
211
|
+
serial: Optional[pulumi.Input[str]] = None,
|
212
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
|
213
|
+
"""
|
214
|
+
## Example Usage
|
215
|
+
|
216
|
+
```python
|
217
|
+
import pulumi
|
218
|
+
import pulumi_vault as vault
|
219
|
+
|
220
|
+
pki = vault.Mount("pki",
|
221
|
+
path="pki",
|
222
|
+
type="pki",
|
223
|
+
description="PKI secret engine mount")
|
224
|
+
root = vault.pki_secret.SecretBackendRootCert("root",
|
225
|
+
backend=pki.path,
|
226
|
+
type="internal",
|
227
|
+
common_name="example",
|
228
|
+
ttl="86400",
|
229
|
+
issuer_name="example")
|
230
|
+
test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
|
231
|
+
backend=test_vault_pki_secret_backend_root_cert["backend"],
|
232
|
+
name="test",
|
233
|
+
allowed_domains=["test.my.domain"],
|
234
|
+
allow_subdomains=True,
|
235
|
+
max_ttl="3600",
|
236
|
+
key_usages=[
|
237
|
+
"DigitalSignature",
|
238
|
+
"KeyAgreement",
|
239
|
+
"KeyEncipherment",
|
240
|
+
],
|
241
|
+
no_store_metadata=False)
|
242
|
+
test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
|
243
|
+
backend=test_secret_backend_role.backend,
|
244
|
+
name=test_secret_backend_role.name,
|
245
|
+
common_name="cert.test.my.domain",
|
246
|
+
ttl="720h",
|
247
|
+
min_seconds_remaining=60,
|
248
|
+
cert_metadata="dGVzdCBtZXRhZGF0YQ==")
|
249
|
+
test = test_secret_backend_cert.serial_number.apply(lambda serial_number: vault.pkiSecret.get_backend_cert_metadata_output(path=test_root["path"],
|
250
|
+
serial=serial_number))
|
251
|
+
```
|
252
|
+
|
253
|
+
|
254
|
+
:param str namespace: The namespace of the target resource.
|
255
|
+
The value should not contain leading or trailing forward slashes.
|
256
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
257
|
+
*Available only for Vault Enterprise*.
|
258
|
+
:param str path: The path to the PKI secret backend to
|
259
|
+
read the cert metadata from, with no leading or trailing `/`s.
|
260
|
+
:param str serial: Specifies the serial of the certificate whose metadata to read.
|
261
|
+
"""
|
262
|
+
__args__ = dict()
|
263
|
+
__args__['namespace'] = namespace
|
264
|
+
__args__['path'] = path
|
265
|
+
__args__['serial'] = serial
|
266
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
267
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendCertMetadata:getBackendCertMetadata', __args__, opts=opts, typ=GetBackendCertMetadataResult)
|
268
|
+
return __ret__.apply(lambda __response__: GetBackendCertMetadataResult(
|
269
|
+
cert_metadata=pulumi.get(__response__, 'cert_metadata'),
|
270
|
+
expiration=pulumi.get(__response__, 'expiration'),
|
271
|
+
id=pulumi.get(__response__, 'id'),
|
272
|
+
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
273
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
+
path=pulumi.get(__response__, 'path'),
|
275
|
+
role=pulumi.get(__response__, 'role'),
|
276
|
+
serial=pulumi.get(__response__, 'serial'),
|
277
|
+
serial_number=pulumi.get(__response__, 'serial_number')))
|
@@ -0,0 +1,226 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
from . import outputs
|
17
|
+
|
18
|
+
__all__ = [
|
19
|
+
'GetBackendConfigCmpv2Result',
|
20
|
+
'AwaitableGetBackendConfigCmpv2Result',
|
21
|
+
'get_backend_config_cmpv2',
|
22
|
+
'get_backend_config_cmpv2_output',
|
23
|
+
]
|
24
|
+
|
25
|
+
@pulumi.output_type
|
26
|
+
class GetBackendConfigCmpv2Result:
|
27
|
+
"""
|
28
|
+
A collection of values returned by getBackendConfigCmpv2.
|
29
|
+
"""
|
30
|
+
def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_path_policy=None, disabled_validations=None, enable_sentinel_parsing=None, enabled=None, id=None, last_updated=None, namespace=None):
|
31
|
+
if audit_fields and not isinstance(audit_fields, list):
|
32
|
+
raise TypeError("Expected argument 'audit_fields' to be a list")
|
33
|
+
pulumi.set(__self__, "audit_fields", audit_fields)
|
34
|
+
if authenticators and not isinstance(authenticators, list):
|
35
|
+
raise TypeError("Expected argument 'authenticators' to be a list")
|
36
|
+
pulumi.set(__self__, "authenticators", authenticators)
|
37
|
+
if backend and not isinstance(backend, str):
|
38
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
39
|
+
pulumi.set(__self__, "backend", backend)
|
40
|
+
if default_path_policy and not isinstance(default_path_policy, str):
|
41
|
+
raise TypeError("Expected argument 'default_path_policy' to be a str")
|
42
|
+
pulumi.set(__self__, "default_path_policy", default_path_policy)
|
43
|
+
if disabled_validations and not isinstance(disabled_validations, list):
|
44
|
+
raise TypeError("Expected argument 'disabled_validations' to be a list")
|
45
|
+
pulumi.set(__self__, "disabled_validations", disabled_validations)
|
46
|
+
if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
|
47
|
+
raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
|
48
|
+
pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
|
49
|
+
if enabled and not isinstance(enabled, bool):
|
50
|
+
raise TypeError("Expected argument 'enabled' to be a bool")
|
51
|
+
pulumi.set(__self__, "enabled", enabled)
|
52
|
+
if id and not isinstance(id, str):
|
53
|
+
raise TypeError("Expected argument 'id' to be a str")
|
54
|
+
pulumi.set(__self__, "id", id)
|
55
|
+
if last_updated and not isinstance(last_updated, str):
|
56
|
+
raise TypeError("Expected argument 'last_updated' to be a str")
|
57
|
+
pulumi.set(__self__, "last_updated", last_updated)
|
58
|
+
if namespace and not isinstance(namespace, str):
|
59
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
60
|
+
pulumi.set(__self__, "namespace", namespace)
|
61
|
+
|
62
|
+
@property
|
63
|
+
@pulumi.getter(name="auditFields")
|
64
|
+
def audit_fields(self) -> Sequence[str]:
|
65
|
+
return pulumi.get(self, "audit_fields")
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter
|
69
|
+
def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
|
70
|
+
return pulumi.get(self, "authenticators")
|
71
|
+
|
72
|
+
@property
|
73
|
+
@pulumi.getter
|
74
|
+
def backend(self) -> str:
|
75
|
+
return pulumi.get(self, "backend")
|
76
|
+
|
77
|
+
@property
|
78
|
+
@pulumi.getter(name="defaultPathPolicy")
|
79
|
+
def default_path_policy(self) -> str:
|
80
|
+
return pulumi.get(self, "default_path_policy")
|
81
|
+
|
82
|
+
@property
|
83
|
+
@pulumi.getter(name="disabledValidations")
|
84
|
+
def disabled_validations(self) -> Optional[Sequence[str]]:
|
85
|
+
return pulumi.get(self, "disabled_validations")
|
86
|
+
|
87
|
+
@property
|
88
|
+
@pulumi.getter(name="enableSentinelParsing")
|
89
|
+
def enable_sentinel_parsing(self) -> bool:
|
90
|
+
return pulumi.get(self, "enable_sentinel_parsing")
|
91
|
+
|
92
|
+
@property
|
93
|
+
@pulumi.getter
|
94
|
+
def enabled(self) -> bool:
|
95
|
+
return pulumi.get(self, "enabled")
|
96
|
+
|
97
|
+
@property
|
98
|
+
@pulumi.getter
|
99
|
+
def id(self) -> str:
|
100
|
+
"""
|
101
|
+
The provider-assigned unique ID for this managed resource.
|
102
|
+
"""
|
103
|
+
return pulumi.get(self, "id")
|
104
|
+
|
105
|
+
@property
|
106
|
+
@pulumi.getter(name="lastUpdated")
|
107
|
+
def last_updated(self) -> str:
|
108
|
+
return pulumi.get(self, "last_updated")
|
109
|
+
|
110
|
+
@property
|
111
|
+
@pulumi.getter
|
112
|
+
def namespace(self) -> Optional[str]:
|
113
|
+
return pulumi.get(self, "namespace")
|
114
|
+
|
115
|
+
|
116
|
+
class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
|
117
|
+
# pylint: disable=using-constant-test
|
118
|
+
def __await__(self):
|
119
|
+
if False:
|
120
|
+
yield self
|
121
|
+
return GetBackendConfigCmpv2Result(
|
122
|
+
audit_fields=self.audit_fields,
|
123
|
+
authenticators=self.authenticators,
|
124
|
+
backend=self.backend,
|
125
|
+
default_path_policy=self.default_path_policy,
|
126
|
+
disabled_validations=self.disabled_validations,
|
127
|
+
enable_sentinel_parsing=self.enable_sentinel_parsing,
|
128
|
+
enabled=self.enabled,
|
129
|
+
id=self.id,
|
130
|
+
last_updated=self.last_updated,
|
131
|
+
namespace=self.namespace)
|
132
|
+
|
133
|
+
|
134
|
+
def get_backend_config_cmpv2(backend: Optional[str] = None,
|
135
|
+
disabled_validations: Optional[Sequence[str]] = None,
|
136
|
+
namespace: Optional[str] = None,
|
137
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
|
138
|
+
"""
|
139
|
+
## Example Usage
|
140
|
+
|
141
|
+
```python
|
142
|
+
import pulumi
|
143
|
+
import pulumi_vault as vault
|
144
|
+
|
145
|
+
pki = vault.Mount("pki",
|
146
|
+
path="pki",
|
147
|
+
type="pki",
|
148
|
+
description="PKI secret engine mount")
|
149
|
+
cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
|
150
|
+
```
|
151
|
+
|
152
|
+
|
153
|
+
:param str backend: The path to the PKI secret backend to
|
154
|
+
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
155
|
+
|
156
|
+
# Attributes Reference
|
157
|
+
:param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
158
|
+
:param str namespace: The namespace of the target resource.
|
159
|
+
The value should not contain leading or trailing forward slashes.
|
160
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
|
+
*Available only for Vault Enterprise*.
|
162
|
+
"""
|
163
|
+
__args__ = dict()
|
164
|
+
__args__['backend'] = backend
|
165
|
+
__args__['disabledValidations'] = disabled_validations
|
166
|
+
__args__['namespace'] = namespace
|
167
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
168
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result).value
|
169
|
+
|
170
|
+
return AwaitableGetBackendConfigCmpv2Result(
|
171
|
+
audit_fields=pulumi.get(__ret__, 'audit_fields'),
|
172
|
+
authenticators=pulumi.get(__ret__, 'authenticators'),
|
173
|
+
backend=pulumi.get(__ret__, 'backend'),
|
174
|
+
default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
|
175
|
+
disabled_validations=pulumi.get(__ret__, 'disabled_validations'),
|
176
|
+
enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
|
177
|
+
enabled=pulumi.get(__ret__, 'enabled'),
|
178
|
+
id=pulumi.get(__ret__, 'id'),
|
179
|
+
last_updated=pulumi.get(__ret__, 'last_updated'),
|
180
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
181
|
+
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
|
182
|
+
disabled_validations: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
183
|
+
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
184
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
|
185
|
+
"""
|
186
|
+
## Example Usage
|
187
|
+
|
188
|
+
```python
|
189
|
+
import pulumi
|
190
|
+
import pulumi_vault as vault
|
191
|
+
|
192
|
+
pki = vault.Mount("pki",
|
193
|
+
path="pki",
|
194
|
+
type="pki",
|
195
|
+
description="PKI secret engine mount")
|
196
|
+
cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
|
197
|
+
```
|
198
|
+
|
199
|
+
|
200
|
+
:param str backend: The path to the PKI secret backend to
|
201
|
+
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
202
|
+
|
203
|
+
# Attributes Reference
|
204
|
+
:param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
205
|
+
:param str namespace: The namespace of the target resource.
|
206
|
+
The value should not contain leading or trailing forward slashes.
|
207
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
208
|
+
*Available only for Vault Enterprise*.
|
209
|
+
"""
|
210
|
+
__args__ = dict()
|
211
|
+
__args__['backend'] = backend
|
212
|
+
__args__['disabledValidations'] = disabled_validations
|
213
|
+
__args__['namespace'] = namespace
|
214
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
215
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result)
|
216
|
+
return __ret__.apply(lambda __response__: GetBackendConfigCmpv2Result(
|
217
|
+
audit_fields=pulumi.get(__response__, 'audit_fields'),
|
218
|
+
authenticators=pulumi.get(__response__, 'authenticators'),
|
219
|
+
backend=pulumi.get(__response__, 'backend'),
|
220
|
+
default_path_policy=pulumi.get(__response__, 'default_path_policy'),
|
221
|
+
disabled_validations=pulumi.get(__response__, 'disabled_validations'),
|
222
|
+
enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
|
223
|
+
enabled=pulumi.get(__response__, 'enabled'),
|
224
|
+
id=pulumi.get(__response__, 'id'),
|
225
|
+
last_updated=pulumi.get(__response__, 'last_updated'),
|
226
|
+
namespace=pulumi.get(__response__, 'namespace')))
|