pulumi-vault 6.6.0a1741329548__py3-none-any.whl → 6.6.0a1741836364__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. pulumi_vault/__init__.py +8 -0
  2. pulumi_vault/aws/auth_backend_client.py +228 -4
  3. pulumi_vault/aws/secret_backend.py +266 -50
  4. pulumi_vault/aws/secret_backend_static_role.py +217 -0
  5. pulumi_vault/azure/auth_backend_config.py +257 -5
  6. pulumi_vault/azure/backend.py +249 -4
  7. pulumi_vault/database/_inputs.py +1692 -36
  8. pulumi_vault/database/outputs.py +1170 -18
  9. pulumi_vault/database/secret_backend_connection.py +220 -0
  10. pulumi_vault/database/secret_backend_static_role.py +143 -1
  11. pulumi_vault/database/secrets_mount.py +8 -0
  12. pulumi_vault/gcp/auth_backend.py +222 -2
  13. pulumi_vault/gcp/secret_backend.py +244 -4
  14. pulumi_vault/ldap/auth_backend.py +222 -2
  15. pulumi_vault/ldap/secret_backend.py +222 -2
  16. pulumi_vault/pkisecret/__init__.py +2 -0
  17. pulumi_vault/pkisecret/_inputs.py +0 -6
  18. pulumi_vault/pkisecret/backend_config_acme.py +47 -0
  19. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
  20. pulumi_vault/pkisecret/backend_config_cmpv2.py +61 -14
  21. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  22. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +18 -1
  23. pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
  24. pulumi_vault/pkisecret/outputs.py +0 -4
  25. pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
  26. pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
  27. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
  28. pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
  29. pulumi_vault/pkisecret/secret_backend_role.py +252 -3
  30. pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
  31. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
  32. pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
  33. pulumi_vault/pulumi-plugin.json +1 -1
  34. pulumi_vault/ssh/__init__.py +1 -0
  35. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  36. pulumi_vault/terraformcloud/secret_role.py +7 -7
  37. pulumi_vault/transit/__init__.py +2 -0
  38. pulumi_vault/transit/get_sign.py +324 -0
  39. pulumi_vault/transit/get_verify.py +354 -0
  40. pulumi_vault/transit/secret_backend_key.py +162 -0
  41. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/METADATA +1 -1
  42. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/RECORD +44 -39
  43. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/WHEEL +1 -1
  44. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,354 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetVerifyResult',
19
+ 'AwaitableGetVerifyResult',
20
+ 'get_verify',
21
+ 'get_verify_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetVerifyResult:
26
+ """
27
+ A collection of values returned by getVerify.
28
+ """
29
+ def __init__(__self__, batch_inputs=None, batch_results=None, cmac=None, context=None, hash_algorithm=None, hmac=None, id=None, input=None, marshaling_algorithm=None, name=None, namespace=None, path=None, prehashed=None, reference=None, salt_length=None, signature=None, signature_algorithm=None, signature_context=None, valid=None):
30
+ if batch_inputs and not isinstance(batch_inputs, list):
31
+ raise TypeError("Expected argument 'batch_inputs' to be a list")
32
+ pulumi.set(__self__, "batch_inputs", batch_inputs)
33
+ if batch_results and not isinstance(batch_results, list):
34
+ raise TypeError("Expected argument 'batch_results' to be a list")
35
+ pulumi.set(__self__, "batch_results", batch_results)
36
+ if cmac and not isinstance(cmac, str):
37
+ raise TypeError("Expected argument 'cmac' to be a str")
38
+ pulumi.set(__self__, "cmac", cmac)
39
+ if context and not isinstance(context, str):
40
+ raise TypeError("Expected argument 'context' to be a str")
41
+ pulumi.set(__self__, "context", context)
42
+ if hash_algorithm and not isinstance(hash_algorithm, str):
43
+ raise TypeError("Expected argument 'hash_algorithm' to be a str")
44
+ pulumi.set(__self__, "hash_algorithm", hash_algorithm)
45
+ if hmac and not isinstance(hmac, str):
46
+ raise TypeError("Expected argument 'hmac' to be a str")
47
+ pulumi.set(__self__, "hmac", hmac)
48
+ if id and not isinstance(id, str):
49
+ raise TypeError("Expected argument 'id' to be a str")
50
+ pulumi.set(__self__, "id", id)
51
+ if input and not isinstance(input, str):
52
+ raise TypeError("Expected argument 'input' to be a str")
53
+ pulumi.set(__self__, "input", input)
54
+ if marshaling_algorithm and not isinstance(marshaling_algorithm, str):
55
+ raise TypeError("Expected argument 'marshaling_algorithm' to be a str")
56
+ pulumi.set(__self__, "marshaling_algorithm", marshaling_algorithm)
57
+ if name and not isinstance(name, str):
58
+ raise TypeError("Expected argument 'name' to be a str")
59
+ pulumi.set(__self__, "name", name)
60
+ if namespace and not isinstance(namespace, str):
61
+ raise TypeError("Expected argument 'namespace' to be a str")
62
+ pulumi.set(__self__, "namespace", namespace)
63
+ if path and not isinstance(path, str):
64
+ raise TypeError("Expected argument 'path' to be a str")
65
+ pulumi.set(__self__, "path", path)
66
+ if prehashed and not isinstance(prehashed, bool):
67
+ raise TypeError("Expected argument 'prehashed' to be a bool")
68
+ pulumi.set(__self__, "prehashed", prehashed)
69
+ if reference and not isinstance(reference, str):
70
+ raise TypeError("Expected argument 'reference' to be a str")
71
+ pulumi.set(__self__, "reference", reference)
72
+ if salt_length and not isinstance(salt_length, str):
73
+ raise TypeError("Expected argument 'salt_length' to be a str")
74
+ pulumi.set(__self__, "salt_length", salt_length)
75
+ if signature and not isinstance(signature, str):
76
+ raise TypeError("Expected argument 'signature' to be a str")
77
+ pulumi.set(__self__, "signature", signature)
78
+ if signature_algorithm and not isinstance(signature_algorithm, str):
79
+ raise TypeError("Expected argument 'signature_algorithm' to be a str")
80
+ pulumi.set(__self__, "signature_algorithm", signature_algorithm)
81
+ if signature_context and not isinstance(signature_context, str):
82
+ raise TypeError("Expected argument 'signature_context' to be a str")
83
+ pulumi.set(__self__, "signature_context", signature_context)
84
+ if valid and not isinstance(valid, bool):
85
+ raise TypeError("Expected argument 'valid' to be a bool")
86
+ pulumi.set(__self__, "valid", valid)
87
+
88
+ @property
89
+ @pulumi.getter(name="batchInputs")
90
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
91
+ return pulumi.get(self, "batch_inputs")
92
+
93
+ @property
94
+ @pulumi.getter(name="batchResults")
95
+ def batch_results(self) -> Sequence[Mapping[str, str]]:
96
+ """
97
+ The results returned from Vault if using `batch_input`
98
+ """
99
+ return pulumi.get(self, "batch_results")
100
+
101
+ @property
102
+ @pulumi.getter
103
+ def cmac(self) -> Optional[str]:
104
+ return pulumi.get(self, "cmac")
105
+
106
+ @property
107
+ @pulumi.getter
108
+ def context(self) -> Optional[str]:
109
+ return pulumi.get(self, "context")
110
+
111
+ @property
112
+ @pulumi.getter(name="hashAlgorithm")
113
+ def hash_algorithm(self) -> Optional[str]:
114
+ return pulumi.get(self, "hash_algorithm")
115
+
116
+ @property
117
+ @pulumi.getter
118
+ def hmac(self) -> Optional[str]:
119
+ return pulumi.get(self, "hmac")
120
+
121
+ @property
122
+ @pulumi.getter
123
+ def id(self) -> str:
124
+ """
125
+ The provider-assigned unique ID for this managed resource.
126
+ """
127
+ return pulumi.get(self, "id")
128
+
129
+ @property
130
+ @pulumi.getter
131
+ def input(self) -> Optional[str]:
132
+ return pulumi.get(self, "input")
133
+
134
+ @property
135
+ @pulumi.getter(name="marshalingAlgorithm")
136
+ def marshaling_algorithm(self) -> Optional[str]:
137
+ return pulumi.get(self, "marshaling_algorithm")
138
+
139
+ @property
140
+ @pulumi.getter
141
+ def name(self) -> str:
142
+ return pulumi.get(self, "name")
143
+
144
+ @property
145
+ @pulumi.getter
146
+ def namespace(self) -> Optional[str]:
147
+ return pulumi.get(self, "namespace")
148
+
149
+ @property
150
+ @pulumi.getter
151
+ def path(self) -> str:
152
+ return pulumi.get(self, "path")
153
+
154
+ @property
155
+ @pulumi.getter
156
+ def prehashed(self) -> Optional[bool]:
157
+ return pulumi.get(self, "prehashed")
158
+
159
+ @property
160
+ @pulumi.getter
161
+ def reference(self) -> Optional[str]:
162
+ return pulumi.get(self, "reference")
163
+
164
+ @property
165
+ @pulumi.getter(name="saltLength")
166
+ def salt_length(self) -> Optional[str]:
167
+ return pulumi.get(self, "salt_length")
168
+
169
+ @property
170
+ @pulumi.getter
171
+ def signature(self) -> Optional[str]:
172
+ return pulumi.get(self, "signature")
173
+
174
+ @property
175
+ @pulumi.getter(name="signatureAlgorithm")
176
+ def signature_algorithm(self) -> Optional[str]:
177
+ return pulumi.get(self, "signature_algorithm")
178
+
179
+ @property
180
+ @pulumi.getter(name="signatureContext")
181
+ def signature_context(self) -> Optional[str]:
182
+ return pulumi.get(self, "signature_context")
183
+
184
+ @property
185
+ @pulumi.getter
186
+ def valid(self) -> bool:
187
+ """
188
+ Returns `true` if the signature verification succeeded and `false` otherwise
189
+ """
190
+ return pulumi.get(self, "valid")
191
+
192
+
193
+ class AwaitableGetVerifyResult(GetVerifyResult):
194
+ # pylint: disable=using-constant-test
195
+ def __await__(self):
196
+ if False:
197
+ yield self
198
+ return GetVerifyResult(
199
+ batch_inputs=self.batch_inputs,
200
+ batch_results=self.batch_results,
201
+ cmac=self.cmac,
202
+ context=self.context,
203
+ hash_algorithm=self.hash_algorithm,
204
+ hmac=self.hmac,
205
+ id=self.id,
206
+ input=self.input,
207
+ marshaling_algorithm=self.marshaling_algorithm,
208
+ name=self.name,
209
+ namespace=self.namespace,
210
+ path=self.path,
211
+ prehashed=self.prehashed,
212
+ reference=self.reference,
213
+ salt_length=self.salt_length,
214
+ signature=self.signature,
215
+ signature_algorithm=self.signature_algorithm,
216
+ signature_context=self.signature_context,
217
+ valid=self.valid)
218
+
219
+
220
+ def get_verify(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
221
+ batch_results: Optional[Sequence[Mapping[str, str]]] = None,
222
+ cmac: Optional[str] = None,
223
+ context: Optional[str] = None,
224
+ hash_algorithm: Optional[str] = None,
225
+ hmac: Optional[str] = None,
226
+ input: Optional[str] = None,
227
+ marshaling_algorithm: Optional[str] = None,
228
+ name: Optional[str] = None,
229
+ namespace: Optional[str] = None,
230
+ path: Optional[str] = None,
231
+ prehashed: Optional[bool] = None,
232
+ reference: Optional[str] = None,
233
+ salt_length: Optional[str] = None,
234
+ signature: Optional[str] = None,
235
+ signature_algorithm: Optional[str] = None,
236
+ signature_context: Optional[str] = None,
237
+ valid: Optional[bool] = None,
238
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetVerifyResult:
239
+ """
240
+ This is a data source which can be used to verify a signature using a Vault Transit key.
241
+
242
+
243
+ :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
244
+ :param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
245
+ """
246
+ __args__ = dict()
247
+ __args__['batchInputs'] = batch_inputs
248
+ __args__['batchResults'] = batch_results
249
+ __args__['cmac'] = cmac
250
+ __args__['context'] = context
251
+ __args__['hashAlgorithm'] = hash_algorithm
252
+ __args__['hmac'] = hmac
253
+ __args__['input'] = input
254
+ __args__['marshalingAlgorithm'] = marshaling_algorithm
255
+ __args__['name'] = name
256
+ __args__['namespace'] = namespace
257
+ __args__['path'] = path
258
+ __args__['prehashed'] = prehashed
259
+ __args__['reference'] = reference
260
+ __args__['saltLength'] = salt_length
261
+ __args__['signature'] = signature
262
+ __args__['signatureAlgorithm'] = signature_algorithm
263
+ __args__['signatureContext'] = signature_context
264
+ __args__['valid'] = valid
265
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
266
+ __ret__ = pulumi.runtime.invoke('vault:transit/getVerify:getVerify', __args__, opts=opts, typ=GetVerifyResult).value
267
+
268
+ return AwaitableGetVerifyResult(
269
+ batch_inputs=pulumi.get(__ret__, 'batch_inputs'),
270
+ batch_results=pulumi.get(__ret__, 'batch_results'),
271
+ cmac=pulumi.get(__ret__, 'cmac'),
272
+ context=pulumi.get(__ret__, 'context'),
273
+ hash_algorithm=pulumi.get(__ret__, 'hash_algorithm'),
274
+ hmac=pulumi.get(__ret__, 'hmac'),
275
+ id=pulumi.get(__ret__, 'id'),
276
+ input=pulumi.get(__ret__, 'input'),
277
+ marshaling_algorithm=pulumi.get(__ret__, 'marshaling_algorithm'),
278
+ name=pulumi.get(__ret__, 'name'),
279
+ namespace=pulumi.get(__ret__, 'namespace'),
280
+ path=pulumi.get(__ret__, 'path'),
281
+ prehashed=pulumi.get(__ret__, 'prehashed'),
282
+ reference=pulumi.get(__ret__, 'reference'),
283
+ salt_length=pulumi.get(__ret__, 'salt_length'),
284
+ signature=pulumi.get(__ret__, 'signature'),
285
+ signature_algorithm=pulumi.get(__ret__, 'signature_algorithm'),
286
+ signature_context=pulumi.get(__ret__, 'signature_context'),
287
+ valid=pulumi.get(__ret__, 'valid'))
288
+ def get_verify_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
289
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
290
+ cmac: Optional[pulumi.Input[Optional[str]]] = None,
291
+ context: Optional[pulumi.Input[Optional[str]]] = None,
292
+ hash_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
293
+ hmac: Optional[pulumi.Input[Optional[str]]] = None,
294
+ input: Optional[pulumi.Input[Optional[str]]] = None,
295
+ marshaling_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
296
+ name: Optional[pulumi.Input[str]] = None,
297
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
298
+ path: Optional[pulumi.Input[str]] = None,
299
+ prehashed: Optional[pulumi.Input[Optional[bool]]] = None,
300
+ reference: Optional[pulumi.Input[Optional[str]]] = None,
301
+ salt_length: Optional[pulumi.Input[Optional[str]]] = None,
302
+ signature: Optional[pulumi.Input[Optional[str]]] = None,
303
+ signature_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
304
+ signature_context: Optional[pulumi.Input[Optional[str]]] = None,
305
+ valid: Optional[pulumi.Input[Optional[bool]]] = None,
306
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetVerifyResult]:
307
+ """
308
+ This is a data source which can be used to verify a signature using a Vault Transit key.
309
+
310
+
311
+ :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
312
+ :param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
313
+ """
314
+ __args__ = dict()
315
+ __args__['batchInputs'] = batch_inputs
316
+ __args__['batchResults'] = batch_results
317
+ __args__['cmac'] = cmac
318
+ __args__['context'] = context
319
+ __args__['hashAlgorithm'] = hash_algorithm
320
+ __args__['hmac'] = hmac
321
+ __args__['input'] = input
322
+ __args__['marshalingAlgorithm'] = marshaling_algorithm
323
+ __args__['name'] = name
324
+ __args__['namespace'] = namespace
325
+ __args__['path'] = path
326
+ __args__['prehashed'] = prehashed
327
+ __args__['reference'] = reference
328
+ __args__['saltLength'] = salt_length
329
+ __args__['signature'] = signature
330
+ __args__['signatureAlgorithm'] = signature_algorithm
331
+ __args__['signatureContext'] = signature_context
332
+ __args__['valid'] = valid
333
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
334
+ __ret__ = pulumi.runtime.invoke_output('vault:transit/getVerify:getVerify', __args__, opts=opts, typ=GetVerifyResult)
335
+ return __ret__.apply(lambda __response__: GetVerifyResult(
336
+ batch_inputs=pulumi.get(__response__, 'batch_inputs'),
337
+ batch_results=pulumi.get(__response__, 'batch_results'),
338
+ cmac=pulumi.get(__response__, 'cmac'),
339
+ context=pulumi.get(__response__, 'context'),
340
+ hash_algorithm=pulumi.get(__response__, 'hash_algorithm'),
341
+ hmac=pulumi.get(__response__, 'hmac'),
342
+ id=pulumi.get(__response__, 'id'),
343
+ input=pulumi.get(__response__, 'input'),
344
+ marshaling_algorithm=pulumi.get(__response__, 'marshaling_algorithm'),
345
+ name=pulumi.get(__response__, 'name'),
346
+ namespace=pulumi.get(__response__, 'namespace'),
347
+ path=pulumi.get(__response__, 'path'),
348
+ prehashed=pulumi.get(__response__, 'prehashed'),
349
+ reference=pulumi.get(__response__, 'reference'),
350
+ salt_length=pulumi.get(__response__, 'salt_length'),
351
+ signature=pulumi.get(__response__, 'signature'),
352
+ signature_algorithm=pulumi.get(__response__, 'signature_algorithm'),
353
+ signature_context=pulumi.get(__response__, 'signature_context'),
354
+ valid=pulumi.get(__response__, 'valid')))