pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +9 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +425 -200
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +523 -306
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +288 -70
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +383 -130
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +432 -186
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +3857 -2200
  53. pulumi_vault/database/outputs.py +2483 -1330
  54. pulumi_vault/database/secret_backend_connection.py +333 -112
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +283 -140
  57. pulumi_vault/database/secrets_mount.py +275 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +426 -205
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +420 -179
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +754 -533
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +720 -499
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +3 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -36
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +174 -126
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -31
  191. pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +894 -644
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
  203. pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +2 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +96 -95
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +3 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +325 -0
  257. pulumi_vault/transit/get_verify.py +355 -0
  258. pulumi_vault/transit/secret_backend_key.py +394 -231
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
  264. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -26,7 +27,7 @@ class GetBackendIssuerResult:
26
27
  """
27
28
  A collection of values returned by getBackendIssuer.
28
29
  """
29
- def __init__(__self__, backend=None, ca_chains=None, certificate=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
30
+ def __init__(__self__, backend=None, ca_chains=None, certificate=None, disable_critical_extension_checks=None, disable_name_checks=None, disable_name_constraint_checks=None, disable_path_length_checks=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
30
31
  if backend and not isinstance(backend, str):
31
32
  raise TypeError("Expected argument 'backend' to be a str")
32
33
  pulumi.set(__self__, "backend", backend)
@@ -36,6 +37,18 @@ class GetBackendIssuerResult:
36
37
  if certificate and not isinstance(certificate, str):
37
38
  raise TypeError("Expected argument 'certificate' to be a str")
38
39
  pulumi.set(__self__, "certificate", certificate)
40
+ if disable_critical_extension_checks and not isinstance(disable_critical_extension_checks, bool):
41
+ raise TypeError("Expected argument 'disable_critical_extension_checks' to be a bool")
42
+ pulumi.set(__self__, "disable_critical_extension_checks", disable_critical_extension_checks)
43
+ if disable_name_checks and not isinstance(disable_name_checks, bool):
44
+ raise TypeError("Expected argument 'disable_name_checks' to be a bool")
45
+ pulumi.set(__self__, "disable_name_checks", disable_name_checks)
46
+ if disable_name_constraint_checks and not isinstance(disable_name_constraint_checks, bool):
47
+ raise TypeError("Expected argument 'disable_name_constraint_checks' to be a bool")
48
+ pulumi.set(__self__, "disable_name_constraint_checks", disable_name_constraint_checks)
49
+ if disable_path_length_checks and not isinstance(disable_path_length_checks, bool):
50
+ raise TypeError("Expected argument 'disable_path_length_checks' to be a bool")
51
+ pulumi.set(__self__, "disable_path_length_checks", disable_path_length_checks)
39
52
  if id and not isinstance(id, str):
40
53
  raise TypeError("Expected argument 'id' to be a str")
41
54
  pulumi.set(__self__, "id", id)
@@ -66,12 +79,12 @@ class GetBackendIssuerResult:
66
79
 
67
80
  @property
68
81
  @pulumi.getter
69
- def backend(self) -> str:
82
+ def backend(self) -> builtins.str:
70
83
  return pulumi.get(self, "backend")
71
84
 
72
85
  @property
73
86
  @pulumi.getter(name="caChains")
74
- def ca_chains(self) -> Sequence[str]:
87
+ def ca_chains(self) -> Sequence[builtins.str]:
75
88
  """
76
89
  The CA chain as a list of format specific certificates.
77
90
  """
@@ -79,15 +92,58 @@ class GetBackendIssuerResult:
79
92
 
80
93
  @property
81
94
  @pulumi.getter
82
- def certificate(self) -> str:
95
+ def certificate(self) -> builtins.str:
83
96
  """
84
97
  Certificate associated with this issuer.
85
98
  """
86
99
  return pulumi.get(self, "certificate")
87
100
 
101
+ @property
102
+ @pulumi.getter(name="disableCriticalExtensionChecks")
103
+ def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
104
+ """
105
+ This determines whether this
106
+ issuer is able to issue certificates where the chain of trust (including the
107
+ issued certificate) contain critical extensions not processed by Vault.
108
+ """
109
+ return pulumi.get(self, "disable_critical_extension_checks")
110
+
111
+ @property
112
+ @pulumi.getter(name="disableNameChecks")
113
+ def disable_name_checks(self) -> Optional[builtins.bool]:
114
+ """
115
+ This determines whether this issuer is able
116
+ to issue certificates where the chain of trust (including the final issued
117
+ certificate) contains a link in which the subject of the issuing certificate
118
+ does not match the named issuer of the certificate it signed.
119
+ """
120
+ return pulumi.get(self, "disable_name_checks")
121
+
122
+ @property
123
+ @pulumi.getter(name="disableNameConstraintChecks")
124
+ def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
125
+ """
126
+ This determines whether this
127
+ issuer is able to issue certificates where the chain of trust (including the
128
+ final issued certificate) violates the name constraints critical extension of
129
+ one of the issuer certificates in the chain.
130
+ """
131
+ return pulumi.get(self, "disable_name_constraint_checks")
132
+
133
+ @property
134
+ @pulumi.getter(name="disablePathLengthChecks")
135
+ def disable_path_length_checks(self) -> Optional[builtins.bool]:
136
+ """
137
+ This determines whether this issuer
138
+ is able to issue certificates where the chain of trust (including the final
139
+ issued certificate) is longer than allowed by a certificate authority in that
140
+ chain.
141
+ """
142
+ return pulumi.get(self, "disable_path_length_checks")
143
+
88
144
  @property
89
145
  @pulumi.getter
90
- def id(self) -> str:
146
+ def id(self) -> builtins.str:
91
147
  """
92
148
  The provider-assigned unique ID for this managed resource.
93
149
  """
@@ -95,7 +151,7 @@ class GetBackendIssuerResult:
95
151
 
96
152
  @property
97
153
  @pulumi.getter(name="issuerId")
98
- def issuer_id(self) -> str:
154
+ def issuer_id(self) -> builtins.str:
99
155
  """
100
156
  ID of the issuer.
101
157
  """
@@ -103,7 +159,7 @@ class GetBackendIssuerResult:
103
159
 
104
160
  @property
105
161
  @pulumi.getter(name="issuerName")
106
- def issuer_name(self) -> str:
162
+ def issuer_name(self) -> builtins.str:
107
163
  """
108
164
  Name of the issuer.
109
165
  """
@@ -111,12 +167,12 @@ class GetBackendIssuerResult:
111
167
 
112
168
  @property
113
169
  @pulumi.getter(name="issuerRef")
114
- def issuer_ref(self) -> str:
170
+ def issuer_ref(self) -> builtins.str:
115
171
  return pulumi.get(self, "issuer_ref")
116
172
 
117
173
  @property
118
174
  @pulumi.getter(name="keyId")
119
- def key_id(self) -> str:
175
+ def key_id(self) -> builtins.str:
120
176
  """
121
177
  ID of the key used by the issuer.
122
178
  """
@@ -124,7 +180,7 @@ class GetBackendIssuerResult:
124
180
 
125
181
  @property
126
182
  @pulumi.getter(name="leafNotAfterBehavior")
127
- def leaf_not_after_behavior(self) -> str:
183
+ def leaf_not_after_behavior(self) -> builtins.str:
128
184
  """
129
185
  Behavior of a leaf's NotAfter field during issuance.
130
186
  """
@@ -132,7 +188,7 @@ class GetBackendIssuerResult:
132
188
 
133
189
  @property
134
190
  @pulumi.getter(name="manualChains")
135
- def manual_chains(self) -> Sequence[str]:
191
+ def manual_chains(self) -> Sequence[builtins.str]:
136
192
  """
137
193
  Chain of issuer references to build this issuer's computed
138
194
  CAChain field from, when non-empty.
@@ -141,12 +197,12 @@ class GetBackendIssuerResult:
141
197
 
142
198
  @property
143
199
  @pulumi.getter
144
- def namespace(self) -> Optional[str]:
200
+ def namespace(self) -> Optional[builtins.str]:
145
201
  return pulumi.get(self, "namespace")
146
202
 
147
203
  @property
148
204
  @pulumi.getter
149
- def usage(self) -> str:
205
+ def usage(self) -> builtins.str:
150
206
  """
151
207
  Allowed usages for this issuer.
152
208
  """
@@ -162,6 +218,10 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
162
218
  backend=self.backend,
163
219
  ca_chains=self.ca_chains,
164
220
  certificate=self.certificate,
221
+ disable_critical_extension_checks=self.disable_critical_extension_checks,
222
+ disable_name_checks=self.disable_name_checks,
223
+ disable_name_constraint_checks=self.disable_name_constraint_checks,
224
+ disable_path_length_checks=self.disable_path_length_checks,
165
225
  id=self.id,
166
226
  issuer_id=self.issuer_id,
167
227
  issuer_name=self.issuer_name,
@@ -173,9 +233,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
173
233
  usage=self.usage)
174
234
 
175
235
 
176
- def get_backend_issuer(backend: Optional[str] = None,
177
- issuer_ref: Optional[str] = None,
178
- namespace: Optional[str] = None,
236
+ def get_backend_issuer(backend: Optional[builtins.str] = None,
237
+ disable_critical_extension_checks: Optional[builtins.bool] = None,
238
+ disable_name_checks: Optional[builtins.bool] = None,
239
+ disable_name_constraint_checks: Optional[builtins.bool] = None,
240
+ disable_path_length_checks: Optional[builtins.bool] = None,
241
+ issuer_ref: Optional[builtins.str] = None,
242
+ namespace: Optional[builtins.str] = None,
179
243
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
180
244
  """
181
245
  ## Example Usage
@@ -199,16 +263,35 @@ def get_backend_issuer(backend: Optional[str] = None,
199
263
  ```
200
264
 
201
265
 
202
- :param str backend: The path to the PKI secret backend to
266
+ :param builtins.str backend: The path to the PKI secret backend to
203
267
  read the issuer from, with no leading or trailing `/`s.
204
- :param str issuer_ref: Reference to an existing issuer.
205
- :param str namespace: The namespace of the target resource.
268
+ :param builtins.bool disable_critical_extension_checks: This determines whether this
269
+ issuer is able to issue certificates where the chain of trust (including the
270
+ issued certificate) contain critical extensions not processed by Vault.
271
+ :param builtins.bool disable_name_checks: This determines whether this issuer is able
272
+ to issue certificates where the chain of trust (including the final issued
273
+ certificate) contains a link in which the subject of the issuing certificate
274
+ does not match the named issuer of the certificate it signed.
275
+ :param builtins.bool disable_name_constraint_checks: This determines whether this
276
+ issuer is able to issue certificates where the chain of trust (including the
277
+ final issued certificate) violates the name constraints critical extension of
278
+ one of the issuer certificates in the chain.
279
+ :param builtins.bool disable_path_length_checks: This determines whether this issuer
280
+ is able to issue certificates where the chain of trust (including the final
281
+ issued certificate) is longer than allowed by a certificate authority in that
282
+ chain.
283
+ :param builtins.str issuer_ref: Reference to an existing issuer.
284
+ :param builtins.str namespace: The namespace of the target resource.
206
285
  The value should not contain leading or trailing forward slashes.
207
286
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
208
287
  *Available only for Vault Enterprise*.
209
288
  """
210
289
  __args__ = dict()
211
290
  __args__['backend'] = backend
291
+ __args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
292
+ __args__['disableNameChecks'] = disable_name_checks
293
+ __args__['disableNameConstraintChecks'] = disable_name_constraint_checks
294
+ __args__['disablePathLengthChecks'] = disable_path_length_checks
212
295
  __args__['issuerRef'] = issuer_ref
213
296
  __args__['namespace'] = namespace
214
297
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
@@ -218,6 +301,10 @@ def get_backend_issuer(backend: Optional[str] = None,
218
301
  backend=pulumi.get(__ret__, 'backend'),
219
302
  ca_chains=pulumi.get(__ret__, 'ca_chains'),
220
303
  certificate=pulumi.get(__ret__, 'certificate'),
304
+ disable_critical_extension_checks=pulumi.get(__ret__, 'disable_critical_extension_checks'),
305
+ disable_name_checks=pulumi.get(__ret__, 'disable_name_checks'),
306
+ disable_name_constraint_checks=pulumi.get(__ret__, 'disable_name_constraint_checks'),
307
+ disable_path_length_checks=pulumi.get(__ret__, 'disable_path_length_checks'),
221
308
  id=pulumi.get(__ret__, 'id'),
222
309
  issuer_id=pulumi.get(__ret__, 'issuer_id'),
223
310
  issuer_name=pulumi.get(__ret__, 'issuer_name'),
@@ -227,9 +314,13 @@ def get_backend_issuer(backend: Optional[str] = None,
227
314
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
228
315
  namespace=pulumi.get(__ret__, 'namespace'),
229
316
  usage=pulumi.get(__ret__, 'usage'))
230
- def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
231
- issuer_ref: Optional[pulumi.Input[str]] = None,
232
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
317
+ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
318
+ disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
319
+ disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
320
+ disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
321
+ disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
322
+ issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
323
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
233
324
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
234
325
  """
235
326
  ## Example Usage
@@ -253,16 +344,35 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
253
344
  ```
254
345
 
255
346
 
256
- :param str backend: The path to the PKI secret backend to
347
+ :param builtins.str backend: The path to the PKI secret backend to
257
348
  read the issuer from, with no leading or trailing `/`s.
258
- :param str issuer_ref: Reference to an existing issuer.
259
- :param str namespace: The namespace of the target resource.
349
+ :param builtins.bool disable_critical_extension_checks: This determines whether this
350
+ issuer is able to issue certificates where the chain of trust (including the
351
+ issued certificate) contain critical extensions not processed by Vault.
352
+ :param builtins.bool disable_name_checks: This determines whether this issuer is able
353
+ to issue certificates where the chain of trust (including the final issued
354
+ certificate) contains a link in which the subject of the issuing certificate
355
+ does not match the named issuer of the certificate it signed.
356
+ :param builtins.bool disable_name_constraint_checks: This determines whether this
357
+ issuer is able to issue certificates where the chain of trust (including the
358
+ final issued certificate) violates the name constraints critical extension of
359
+ one of the issuer certificates in the chain.
360
+ :param builtins.bool disable_path_length_checks: This determines whether this issuer
361
+ is able to issue certificates where the chain of trust (including the final
362
+ issued certificate) is longer than allowed by a certificate authority in that
363
+ chain.
364
+ :param builtins.str issuer_ref: Reference to an existing issuer.
365
+ :param builtins.str namespace: The namespace of the target resource.
260
366
  The value should not contain leading or trailing forward slashes.
261
367
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
368
  *Available only for Vault Enterprise*.
263
369
  """
264
370
  __args__ = dict()
265
371
  __args__['backend'] = backend
372
+ __args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
373
+ __args__['disableNameChecks'] = disable_name_checks
374
+ __args__['disableNameConstraintChecks'] = disable_name_constraint_checks
375
+ __args__['disablePathLengthChecks'] = disable_path_length_checks
266
376
  __args__['issuerRef'] = issuer_ref
267
377
  __args__['namespace'] = namespace
268
378
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
@@ -271,6 +381,10 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
271
381
  backend=pulumi.get(__response__, 'backend'),
272
382
  ca_chains=pulumi.get(__response__, 'ca_chains'),
273
383
  certificate=pulumi.get(__response__, 'certificate'),
384
+ disable_critical_extension_checks=pulumi.get(__response__, 'disable_critical_extension_checks'),
385
+ disable_name_checks=pulumi.get(__response__, 'disable_name_checks'),
386
+ disable_name_constraint_checks=pulumi.get(__response__, 'disable_name_constraint_checks'),
387
+ disable_path_length_checks=pulumi.get(__response__, 'disable_path_length_checks'),
274
388
  id=pulumi.get(__response__, 'id'),
275
389
  issuer_id=pulumi.get(__response__, 'issuer_id'),
276
390
  issuer_name=pulumi.get(__response__, 'issuer_name'),
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,12 +49,12 @@ class GetBackendIssuersResult:
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def backend(self) -> str:
52
+ def backend(self) -> builtins.str:
52
53
  return pulumi.get(self, "backend")
53
54
 
54
55
  @property
55
56
  @pulumi.getter
56
- def id(self) -> str:
57
+ def id(self) -> builtins.str:
57
58
  """
58
59
  The provider-assigned unique ID for this managed resource.
59
60
  """
@@ -61,7 +62,7 @@ class GetBackendIssuersResult:
61
62
 
62
63
  @property
63
64
  @pulumi.getter(name="keyInfo")
64
- def key_info(self) -> Mapping[str, str]:
65
+ def key_info(self) -> Mapping[str, builtins.str]:
65
66
  """
66
67
  Map of issuer strings read from Vault.
67
68
  """
@@ -69,7 +70,7 @@ class GetBackendIssuersResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="keyInfoJson")
72
- def key_info_json(self) -> str:
73
+ def key_info_json(self) -> builtins.str:
73
74
  """
74
75
  JSON-encoded issuer data read from Vault.
75
76
  """
@@ -77,7 +78,7 @@ class GetBackendIssuersResult:
77
78
 
78
79
  @property
79
80
  @pulumi.getter
80
- def keys(self) -> Sequence[str]:
81
+ def keys(self) -> Sequence[builtins.str]:
81
82
  """
82
83
  Keys used by issuers under the backend path.
83
84
  """
@@ -85,7 +86,7 @@ class GetBackendIssuersResult:
85
86
 
86
87
  @property
87
88
  @pulumi.getter
88
- def namespace(self) -> Optional[str]:
89
+ def namespace(self) -> Optional[builtins.str]:
89
90
  return pulumi.get(self, "namespace")
90
91
 
91
92
 
@@ -103,8 +104,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
103
104
  namespace=self.namespace)
104
105
 
105
106
 
106
- def get_backend_issuers(backend: Optional[str] = None,
107
- namespace: Optional[str] = None,
107
+ def get_backend_issuers(backend: Optional[builtins.str] = None,
108
+ namespace: Optional[builtins.str] = None,
108
109
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
109
110
  """
110
111
  ## Example Usage
@@ -127,9 +128,9 @@ def get_backend_issuers(backend: Optional[str] = None,
127
128
  ```
128
129
 
129
130
 
130
- :param str backend: The path to the PKI secret backend to
131
+ :param builtins.str backend: The path to the PKI secret backend to
131
132
  read the issuers from, with no leading or trailing `/`s.
132
- :param str namespace: The namespace of the target resource.
133
+ :param builtins.str namespace: The namespace of the target resource.
133
134
  The value should not contain leading or trailing forward slashes.
134
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
136
  *Available only for Vault Enterprise*.
@@ -147,8 +148,8 @@ def get_backend_issuers(backend: Optional[str] = None,
147
148
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
149
  keys=pulumi.get(__ret__, 'keys'),
149
150
  namespace=pulumi.get(__ret__, 'namespace'))
150
- def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
151
+ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
152
153
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
154
  """
154
155
  ## Example Usage
@@ -171,9 +172,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
171
172
  ```
172
173
 
173
174
 
174
- :param str backend: The path to the PKI secret backend to
175
+ :param builtins.str backend: The path to the PKI secret backend to
175
176
  read the issuers from, with no leading or trailing `/`s.
176
- :param str namespace: The namespace of the target resource.
177
+ :param builtins.str namespace: The namespace of the target resource.
177
178
  The value should not contain leading or trailing forward slashes.
178
179
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
180
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -51,12 +52,12 @@ class GetBackendKeyResult:
51
52
 
52
53
  @property
53
54
  @pulumi.getter
54
- def backend(self) -> str:
55
+ def backend(self) -> builtins.str:
55
56
  return pulumi.get(self, "backend")
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def id(self) -> str:
60
+ def id(self) -> builtins.str:
60
61
  """
61
62
  The provider-assigned unique ID for this managed resource.
62
63
  """
@@ -64,7 +65,7 @@ class GetBackendKeyResult:
64
65
 
65
66
  @property
66
67
  @pulumi.getter(name="keyId")
67
- def key_id(self) -> str:
68
+ def key_id(self) -> builtins.str:
68
69
  """
69
70
  ID of the key.
70
71
  """
@@ -72,7 +73,7 @@ class GetBackendKeyResult:
72
73
 
73
74
  @property
74
75
  @pulumi.getter(name="keyName")
75
- def key_name(self) -> str:
76
+ def key_name(self) -> builtins.str:
76
77
  """
77
78
  Name of the key.
78
79
  """
@@ -80,12 +81,12 @@ class GetBackendKeyResult:
80
81
 
81
82
  @property
82
83
  @pulumi.getter(name="keyRef")
83
- def key_ref(self) -> str:
84
+ def key_ref(self) -> builtins.str:
84
85
  return pulumi.get(self, "key_ref")
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="keyType")
88
- def key_type(self) -> str:
89
+ def key_type(self) -> builtins.str:
89
90
  """
90
91
  Type of the key.
91
92
  """
@@ -93,7 +94,7 @@ class GetBackendKeyResult:
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def namespace(self) -> Optional[str]:
97
+ def namespace(self) -> Optional[builtins.str]:
97
98
  return pulumi.get(self, "namespace")
98
99
 
99
100
 
@@ -112,9 +113,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
112
113
  namespace=self.namespace)
113
114
 
114
115
 
115
- def get_backend_key(backend: Optional[str] = None,
116
- key_ref: Optional[str] = None,
117
- namespace: Optional[str] = None,
116
+ def get_backend_key(backend: Optional[builtins.str] = None,
117
+ key_ref: Optional[builtins.str] = None,
118
+ namespace: Optional[builtins.str] = None,
118
119
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
119
120
  """
120
121
  ## Example Usage
@@ -138,10 +139,10 @@ def get_backend_key(backend: Optional[str] = None,
138
139
  ```
139
140
 
140
141
 
141
- :param str backend: The path to the PKI secret backend to
142
+ :param builtins.str backend: The path to the PKI secret backend to
142
143
  read the key from, with no leading or trailing `/`s.
143
- :param str key_ref: Reference to an existing key.
144
- :param str namespace: The namespace of the target resource.
144
+ :param builtins.str key_ref: Reference to an existing key.
145
+ :param builtins.str namespace: The namespace of the target resource.
145
146
  The value should not contain leading or trailing forward slashes.
146
147
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
148
  *Available only for Vault Enterprise*.
@@ -161,9 +162,9 @@ def get_backend_key(backend: Optional[str] = None,
161
162
  key_ref=pulumi.get(__ret__, 'key_ref'),
162
163
  key_type=pulumi.get(__ret__, 'key_type'),
163
164
  namespace=pulumi.get(__ret__, 'namespace'))
164
- def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
- key_ref: Optional[pulumi.Input[str]] = None,
166
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
165
+ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
166
+ key_ref: Optional[pulumi.Input[builtins.str]] = None,
167
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
167
168
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
168
169
  """
169
170
  ## Example Usage
@@ -187,10 +188,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
187
188
  ```
188
189
 
189
190
 
190
- :param str backend: The path to the PKI secret backend to
191
+ :param builtins.str backend: The path to the PKI secret backend to
191
192
  read the key from, with no leading or trailing `/`s.
192
- :param str key_ref: Reference to an existing key.
193
- :param str namespace: The namespace of the target resource.
193
+ :param builtins.str key_ref: Reference to an existing key.
194
+ :param builtins.str namespace: The namespace of the target resource.
194
195
  The value should not contain leading or trailing forward slashes.
195
196
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
197
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,12 +49,12 @@ class GetBackendKeysResult:
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def backend(self) -> str:
52
+ def backend(self) -> builtins.str:
52
53
  return pulumi.get(self, "backend")
53
54
 
54
55
  @property
55
56
  @pulumi.getter
56
- def id(self) -> str:
57
+ def id(self) -> builtins.str:
57
58
  """
58
59
  The provider-assigned unique ID for this managed resource.
59
60
  """
@@ -61,7 +62,7 @@ class GetBackendKeysResult:
61
62
 
62
63
  @property
63
64
  @pulumi.getter(name="keyInfo")
64
- def key_info(self) -> Mapping[str, str]:
65
+ def key_info(self) -> Mapping[str, builtins.str]:
65
66
  """
66
67
  Map of key strings read from Vault.
67
68
  """
@@ -69,7 +70,7 @@ class GetBackendKeysResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="keyInfoJson")
72
- def key_info_json(self) -> str:
73
+ def key_info_json(self) -> builtins.str:
73
74
  """
74
75
  JSON-encoded key data read from Vault.
75
76
  """
@@ -77,7 +78,7 @@ class GetBackendKeysResult:
77
78
 
78
79
  @property
79
80
  @pulumi.getter
80
- def keys(self) -> Sequence[str]:
81
+ def keys(self) -> Sequence[builtins.str]:
81
82
  """
82
83
  Keys used under the backend path.
83
84
  """
@@ -85,7 +86,7 @@ class GetBackendKeysResult:
85
86
 
86
87
  @property
87
88
  @pulumi.getter
88
- def namespace(self) -> Optional[str]:
89
+ def namespace(self) -> Optional[builtins.str]:
89
90
  return pulumi.get(self, "namespace")
90
91
 
91
92
 
@@ -103,8 +104,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
103
104
  namespace=self.namespace)
104
105
 
105
106
 
106
- def get_backend_keys(backend: Optional[str] = None,
107
- namespace: Optional[str] = None,
107
+ def get_backend_keys(backend: Optional[builtins.str] = None,
108
+ namespace: Optional[builtins.str] = None,
108
109
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
109
110
  """
110
111
  ## Example Usage
@@ -127,9 +128,9 @@ def get_backend_keys(backend: Optional[str] = None,
127
128
  ```
128
129
 
129
130
 
130
- :param str backend: The path to the PKI secret backend to
131
+ :param builtins.str backend: The path to the PKI secret backend to
131
132
  read the keys from, with no leading or trailing `/`s.
132
- :param str namespace: The namespace of the target resource.
133
+ :param builtins.str namespace: The namespace of the target resource.
133
134
  The value should not contain leading or trailing forward slashes.
134
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
136
  *Available only for Vault Enterprise*.
@@ -147,8 +148,8 @@ def get_backend_keys(backend: Optional[str] = None,
147
148
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
149
  keys=pulumi.get(__ret__, 'keys'),
149
150
  namespace=pulumi.get(__ret__, 'namespace'))
150
- def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
151
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
151
+ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
152
153
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
153
154
  """
154
155
  ## Example Usage
@@ -171,9 +172,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
171
172
  ```
172
173
 
173
174
 
174
- :param str backend: The path to the PKI secret backend to
175
+ :param builtins.str backend: The path to the PKI secret backend to
175
176
  read the keys from, with no leading or trailing `/`s.
176
- :param str namespace: The namespace of the target resource.
177
+ :param builtins.str namespace: The namespace of the target resource.
177
178
  The value should not contain leading or trailing forward slashes.
178
179
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
180
  *Available only for Vault Enterprise*.