pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +9 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +425 -200
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +523 -306
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +288 -70
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +383 -130
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +432 -186
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +3857 -2200
- pulumi_vault/database/outputs.py +2483 -1330
- pulumi_vault/database/secret_backend_connection.py +333 -112
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +283 -140
- pulumi_vault/database/secrets_mount.py +275 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +426 -205
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +420 -179
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +754 -533
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +720 -499
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +31 -36
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +174 -126
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -31
- pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +894 -644
- pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
- pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +2 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +96 -95
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +3 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +325 -0
- pulumi_vault/transit/get_verify.py +355 -0
- pulumi_vault/transit/secret_backend_key.py +394 -231
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -26,7 +27,7 @@ class GetBackendIssuerResult:
|
|
26
27
|
"""
|
27
28
|
A collection of values returned by getBackendIssuer.
|
28
29
|
"""
|
29
|
-
def __init__(__self__, backend=None, ca_chains=None, certificate=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
|
30
|
+
def __init__(__self__, backend=None, ca_chains=None, certificate=None, disable_critical_extension_checks=None, disable_name_checks=None, disable_name_constraint_checks=None, disable_path_length_checks=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
|
30
31
|
if backend and not isinstance(backend, str):
|
31
32
|
raise TypeError("Expected argument 'backend' to be a str")
|
32
33
|
pulumi.set(__self__, "backend", backend)
|
@@ -36,6 +37,18 @@ class GetBackendIssuerResult:
|
|
36
37
|
if certificate and not isinstance(certificate, str):
|
37
38
|
raise TypeError("Expected argument 'certificate' to be a str")
|
38
39
|
pulumi.set(__self__, "certificate", certificate)
|
40
|
+
if disable_critical_extension_checks and not isinstance(disable_critical_extension_checks, bool):
|
41
|
+
raise TypeError("Expected argument 'disable_critical_extension_checks' to be a bool")
|
42
|
+
pulumi.set(__self__, "disable_critical_extension_checks", disable_critical_extension_checks)
|
43
|
+
if disable_name_checks and not isinstance(disable_name_checks, bool):
|
44
|
+
raise TypeError("Expected argument 'disable_name_checks' to be a bool")
|
45
|
+
pulumi.set(__self__, "disable_name_checks", disable_name_checks)
|
46
|
+
if disable_name_constraint_checks and not isinstance(disable_name_constraint_checks, bool):
|
47
|
+
raise TypeError("Expected argument 'disable_name_constraint_checks' to be a bool")
|
48
|
+
pulumi.set(__self__, "disable_name_constraint_checks", disable_name_constraint_checks)
|
49
|
+
if disable_path_length_checks and not isinstance(disable_path_length_checks, bool):
|
50
|
+
raise TypeError("Expected argument 'disable_path_length_checks' to be a bool")
|
51
|
+
pulumi.set(__self__, "disable_path_length_checks", disable_path_length_checks)
|
39
52
|
if id and not isinstance(id, str):
|
40
53
|
raise TypeError("Expected argument 'id' to be a str")
|
41
54
|
pulumi.set(__self__, "id", id)
|
@@ -66,12 +79,12 @@ class GetBackendIssuerResult:
|
|
66
79
|
|
67
80
|
@property
|
68
81
|
@pulumi.getter
|
69
|
-
def backend(self) -> str:
|
82
|
+
def backend(self) -> builtins.str:
|
70
83
|
return pulumi.get(self, "backend")
|
71
84
|
|
72
85
|
@property
|
73
86
|
@pulumi.getter(name="caChains")
|
74
|
-
def ca_chains(self) -> Sequence[str]:
|
87
|
+
def ca_chains(self) -> Sequence[builtins.str]:
|
75
88
|
"""
|
76
89
|
The CA chain as a list of format specific certificates.
|
77
90
|
"""
|
@@ -79,15 +92,58 @@ class GetBackendIssuerResult:
|
|
79
92
|
|
80
93
|
@property
|
81
94
|
@pulumi.getter
|
82
|
-
def certificate(self) -> str:
|
95
|
+
def certificate(self) -> builtins.str:
|
83
96
|
"""
|
84
97
|
Certificate associated with this issuer.
|
85
98
|
"""
|
86
99
|
return pulumi.get(self, "certificate")
|
87
100
|
|
101
|
+
@property
|
102
|
+
@pulumi.getter(name="disableCriticalExtensionChecks")
|
103
|
+
def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
|
104
|
+
"""
|
105
|
+
This determines whether this
|
106
|
+
issuer is able to issue certificates where the chain of trust (including the
|
107
|
+
issued certificate) contain critical extensions not processed by Vault.
|
108
|
+
"""
|
109
|
+
return pulumi.get(self, "disable_critical_extension_checks")
|
110
|
+
|
111
|
+
@property
|
112
|
+
@pulumi.getter(name="disableNameChecks")
|
113
|
+
def disable_name_checks(self) -> Optional[builtins.bool]:
|
114
|
+
"""
|
115
|
+
This determines whether this issuer is able
|
116
|
+
to issue certificates where the chain of trust (including the final issued
|
117
|
+
certificate) contains a link in which the subject of the issuing certificate
|
118
|
+
does not match the named issuer of the certificate it signed.
|
119
|
+
"""
|
120
|
+
return pulumi.get(self, "disable_name_checks")
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter(name="disableNameConstraintChecks")
|
124
|
+
def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
|
125
|
+
"""
|
126
|
+
This determines whether this
|
127
|
+
issuer is able to issue certificates where the chain of trust (including the
|
128
|
+
final issued certificate) violates the name constraints critical extension of
|
129
|
+
one of the issuer certificates in the chain.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "disable_name_constraint_checks")
|
132
|
+
|
133
|
+
@property
|
134
|
+
@pulumi.getter(name="disablePathLengthChecks")
|
135
|
+
def disable_path_length_checks(self) -> Optional[builtins.bool]:
|
136
|
+
"""
|
137
|
+
This determines whether this issuer
|
138
|
+
is able to issue certificates where the chain of trust (including the final
|
139
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
140
|
+
chain.
|
141
|
+
"""
|
142
|
+
return pulumi.get(self, "disable_path_length_checks")
|
143
|
+
|
88
144
|
@property
|
89
145
|
@pulumi.getter
|
90
|
-
def id(self) -> str:
|
146
|
+
def id(self) -> builtins.str:
|
91
147
|
"""
|
92
148
|
The provider-assigned unique ID for this managed resource.
|
93
149
|
"""
|
@@ -95,7 +151,7 @@ class GetBackendIssuerResult:
|
|
95
151
|
|
96
152
|
@property
|
97
153
|
@pulumi.getter(name="issuerId")
|
98
|
-
def issuer_id(self) -> str:
|
154
|
+
def issuer_id(self) -> builtins.str:
|
99
155
|
"""
|
100
156
|
ID of the issuer.
|
101
157
|
"""
|
@@ -103,7 +159,7 @@ class GetBackendIssuerResult:
|
|
103
159
|
|
104
160
|
@property
|
105
161
|
@pulumi.getter(name="issuerName")
|
106
|
-
def issuer_name(self) -> str:
|
162
|
+
def issuer_name(self) -> builtins.str:
|
107
163
|
"""
|
108
164
|
Name of the issuer.
|
109
165
|
"""
|
@@ -111,12 +167,12 @@ class GetBackendIssuerResult:
|
|
111
167
|
|
112
168
|
@property
|
113
169
|
@pulumi.getter(name="issuerRef")
|
114
|
-
def issuer_ref(self) -> str:
|
170
|
+
def issuer_ref(self) -> builtins.str:
|
115
171
|
return pulumi.get(self, "issuer_ref")
|
116
172
|
|
117
173
|
@property
|
118
174
|
@pulumi.getter(name="keyId")
|
119
|
-
def key_id(self) -> str:
|
175
|
+
def key_id(self) -> builtins.str:
|
120
176
|
"""
|
121
177
|
ID of the key used by the issuer.
|
122
178
|
"""
|
@@ -124,7 +180,7 @@ class GetBackendIssuerResult:
|
|
124
180
|
|
125
181
|
@property
|
126
182
|
@pulumi.getter(name="leafNotAfterBehavior")
|
127
|
-
def leaf_not_after_behavior(self) -> str:
|
183
|
+
def leaf_not_after_behavior(self) -> builtins.str:
|
128
184
|
"""
|
129
185
|
Behavior of a leaf's NotAfter field during issuance.
|
130
186
|
"""
|
@@ -132,7 +188,7 @@ class GetBackendIssuerResult:
|
|
132
188
|
|
133
189
|
@property
|
134
190
|
@pulumi.getter(name="manualChains")
|
135
|
-
def manual_chains(self) -> Sequence[str]:
|
191
|
+
def manual_chains(self) -> Sequence[builtins.str]:
|
136
192
|
"""
|
137
193
|
Chain of issuer references to build this issuer's computed
|
138
194
|
CAChain field from, when non-empty.
|
@@ -141,12 +197,12 @@ class GetBackendIssuerResult:
|
|
141
197
|
|
142
198
|
@property
|
143
199
|
@pulumi.getter
|
144
|
-
def namespace(self) -> Optional[str]:
|
200
|
+
def namespace(self) -> Optional[builtins.str]:
|
145
201
|
return pulumi.get(self, "namespace")
|
146
202
|
|
147
203
|
@property
|
148
204
|
@pulumi.getter
|
149
|
-
def usage(self) -> str:
|
205
|
+
def usage(self) -> builtins.str:
|
150
206
|
"""
|
151
207
|
Allowed usages for this issuer.
|
152
208
|
"""
|
@@ -162,6 +218,10 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
162
218
|
backend=self.backend,
|
163
219
|
ca_chains=self.ca_chains,
|
164
220
|
certificate=self.certificate,
|
221
|
+
disable_critical_extension_checks=self.disable_critical_extension_checks,
|
222
|
+
disable_name_checks=self.disable_name_checks,
|
223
|
+
disable_name_constraint_checks=self.disable_name_constraint_checks,
|
224
|
+
disable_path_length_checks=self.disable_path_length_checks,
|
165
225
|
id=self.id,
|
166
226
|
issuer_id=self.issuer_id,
|
167
227
|
issuer_name=self.issuer_name,
|
@@ -173,9 +233,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
173
233
|
usage=self.usage)
|
174
234
|
|
175
235
|
|
176
|
-
def get_backend_issuer(backend: Optional[str] = None,
|
177
|
-
|
178
|
-
|
236
|
+
def get_backend_issuer(backend: Optional[builtins.str] = None,
|
237
|
+
disable_critical_extension_checks: Optional[builtins.bool] = None,
|
238
|
+
disable_name_checks: Optional[builtins.bool] = None,
|
239
|
+
disable_name_constraint_checks: Optional[builtins.bool] = None,
|
240
|
+
disable_path_length_checks: Optional[builtins.bool] = None,
|
241
|
+
issuer_ref: Optional[builtins.str] = None,
|
242
|
+
namespace: Optional[builtins.str] = None,
|
179
243
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
180
244
|
"""
|
181
245
|
## Example Usage
|
@@ -199,16 +263,35 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
199
263
|
```
|
200
264
|
|
201
265
|
|
202
|
-
:param str backend: The path to the PKI secret backend to
|
266
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
203
267
|
read the issuer from, with no leading or trailing `/`s.
|
204
|
-
:param
|
205
|
-
|
268
|
+
:param builtins.bool disable_critical_extension_checks: This determines whether this
|
269
|
+
issuer is able to issue certificates where the chain of trust (including the
|
270
|
+
issued certificate) contain critical extensions not processed by Vault.
|
271
|
+
:param builtins.bool disable_name_checks: This determines whether this issuer is able
|
272
|
+
to issue certificates where the chain of trust (including the final issued
|
273
|
+
certificate) contains a link in which the subject of the issuing certificate
|
274
|
+
does not match the named issuer of the certificate it signed.
|
275
|
+
:param builtins.bool disable_name_constraint_checks: This determines whether this
|
276
|
+
issuer is able to issue certificates where the chain of trust (including the
|
277
|
+
final issued certificate) violates the name constraints critical extension of
|
278
|
+
one of the issuer certificates in the chain.
|
279
|
+
:param builtins.bool disable_path_length_checks: This determines whether this issuer
|
280
|
+
is able to issue certificates where the chain of trust (including the final
|
281
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
282
|
+
chain.
|
283
|
+
:param builtins.str issuer_ref: Reference to an existing issuer.
|
284
|
+
:param builtins.str namespace: The namespace of the target resource.
|
206
285
|
The value should not contain leading or trailing forward slashes.
|
207
286
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
208
287
|
*Available only for Vault Enterprise*.
|
209
288
|
"""
|
210
289
|
__args__ = dict()
|
211
290
|
__args__['backend'] = backend
|
291
|
+
__args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
|
292
|
+
__args__['disableNameChecks'] = disable_name_checks
|
293
|
+
__args__['disableNameConstraintChecks'] = disable_name_constraint_checks
|
294
|
+
__args__['disablePathLengthChecks'] = disable_path_length_checks
|
212
295
|
__args__['issuerRef'] = issuer_ref
|
213
296
|
__args__['namespace'] = namespace
|
214
297
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
@@ -218,6 +301,10 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
218
301
|
backend=pulumi.get(__ret__, 'backend'),
|
219
302
|
ca_chains=pulumi.get(__ret__, 'ca_chains'),
|
220
303
|
certificate=pulumi.get(__ret__, 'certificate'),
|
304
|
+
disable_critical_extension_checks=pulumi.get(__ret__, 'disable_critical_extension_checks'),
|
305
|
+
disable_name_checks=pulumi.get(__ret__, 'disable_name_checks'),
|
306
|
+
disable_name_constraint_checks=pulumi.get(__ret__, 'disable_name_constraint_checks'),
|
307
|
+
disable_path_length_checks=pulumi.get(__ret__, 'disable_path_length_checks'),
|
221
308
|
id=pulumi.get(__ret__, 'id'),
|
222
309
|
issuer_id=pulumi.get(__ret__, 'issuer_id'),
|
223
310
|
issuer_name=pulumi.get(__ret__, 'issuer_name'),
|
@@ -227,9 +314,13 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
227
314
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
228
315
|
namespace=pulumi.get(__ret__, 'namespace'),
|
229
316
|
usage=pulumi.get(__ret__, 'usage'))
|
230
|
-
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
231
|
-
|
232
|
-
|
317
|
+
def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
318
|
+
disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
319
|
+
disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
320
|
+
disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
321
|
+
disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
322
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
323
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
233
324
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
234
325
|
"""
|
235
326
|
## Example Usage
|
@@ -253,16 +344,35 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
253
344
|
```
|
254
345
|
|
255
346
|
|
256
|
-
:param str backend: The path to the PKI secret backend to
|
347
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
257
348
|
read the issuer from, with no leading or trailing `/`s.
|
258
|
-
:param
|
259
|
-
|
349
|
+
:param builtins.bool disable_critical_extension_checks: This determines whether this
|
350
|
+
issuer is able to issue certificates where the chain of trust (including the
|
351
|
+
issued certificate) contain critical extensions not processed by Vault.
|
352
|
+
:param builtins.bool disable_name_checks: This determines whether this issuer is able
|
353
|
+
to issue certificates where the chain of trust (including the final issued
|
354
|
+
certificate) contains a link in which the subject of the issuing certificate
|
355
|
+
does not match the named issuer of the certificate it signed.
|
356
|
+
:param builtins.bool disable_name_constraint_checks: This determines whether this
|
357
|
+
issuer is able to issue certificates where the chain of trust (including the
|
358
|
+
final issued certificate) violates the name constraints critical extension of
|
359
|
+
one of the issuer certificates in the chain.
|
360
|
+
:param builtins.bool disable_path_length_checks: This determines whether this issuer
|
361
|
+
is able to issue certificates where the chain of trust (including the final
|
362
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
363
|
+
chain.
|
364
|
+
:param builtins.str issuer_ref: Reference to an existing issuer.
|
365
|
+
:param builtins.str namespace: The namespace of the target resource.
|
260
366
|
The value should not contain leading or trailing forward slashes.
|
261
367
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
368
|
*Available only for Vault Enterprise*.
|
263
369
|
"""
|
264
370
|
__args__ = dict()
|
265
371
|
__args__['backend'] = backend
|
372
|
+
__args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
|
373
|
+
__args__['disableNameChecks'] = disable_name_checks
|
374
|
+
__args__['disableNameConstraintChecks'] = disable_name_constraint_checks
|
375
|
+
__args__['disablePathLengthChecks'] = disable_path_length_checks
|
266
376
|
__args__['issuerRef'] = issuer_ref
|
267
377
|
__args__['namespace'] = namespace
|
268
378
|
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
@@ -271,6 +381,10 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
271
381
|
backend=pulumi.get(__response__, 'backend'),
|
272
382
|
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
273
383
|
certificate=pulumi.get(__response__, 'certificate'),
|
384
|
+
disable_critical_extension_checks=pulumi.get(__response__, 'disable_critical_extension_checks'),
|
385
|
+
disable_name_checks=pulumi.get(__response__, 'disable_name_checks'),
|
386
|
+
disable_name_constraint_checks=pulumi.get(__response__, 'disable_name_constraint_checks'),
|
387
|
+
disable_path_length_checks=pulumi.get(__response__, 'disable_path_length_checks'),
|
274
388
|
id=pulumi.get(__response__, 'id'),
|
275
389
|
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
276
390
|
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,12 +49,12 @@ class GetBackendIssuersResult:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def backend(self) -> str:
|
52
|
+
def backend(self) -> builtins.str:
|
52
53
|
return pulumi.get(self, "backend")
|
53
54
|
|
54
55
|
@property
|
55
56
|
@pulumi.getter
|
56
|
-
def id(self) -> str:
|
57
|
+
def id(self) -> builtins.str:
|
57
58
|
"""
|
58
59
|
The provider-assigned unique ID for this managed resource.
|
59
60
|
"""
|
@@ -61,7 +62,7 @@ class GetBackendIssuersResult:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter(name="keyInfo")
|
64
|
-
def key_info(self) -> Mapping[str, str]:
|
65
|
+
def key_info(self) -> Mapping[str, builtins.str]:
|
65
66
|
"""
|
66
67
|
Map of issuer strings read from Vault.
|
67
68
|
"""
|
@@ -69,7 +70,7 @@ class GetBackendIssuersResult:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="keyInfoJson")
|
72
|
-
def key_info_json(self) -> str:
|
73
|
+
def key_info_json(self) -> builtins.str:
|
73
74
|
"""
|
74
75
|
JSON-encoded issuer data read from Vault.
|
75
76
|
"""
|
@@ -77,7 +78,7 @@ class GetBackendIssuersResult:
|
|
77
78
|
|
78
79
|
@property
|
79
80
|
@pulumi.getter
|
80
|
-
def keys(self) -> Sequence[str]:
|
81
|
+
def keys(self) -> Sequence[builtins.str]:
|
81
82
|
"""
|
82
83
|
Keys used by issuers under the backend path.
|
83
84
|
"""
|
@@ -85,7 +86,7 @@ class GetBackendIssuersResult:
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def namespace(self) -> Optional[str]:
|
89
|
+
def namespace(self) -> Optional[builtins.str]:
|
89
90
|
return pulumi.get(self, "namespace")
|
90
91
|
|
91
92
|
|
@@ -103,8 +104,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
|
|
103
104
|
namespace=self.namespace)
|
104
105
|
|
105
106
|
|
106
|
-
def get_backend_issuers(backend: Optional[str] = None,
|
107
|
-
namespace: Optional[str] = None,
|
107
|
+
def get_backend_issuers(backend: Optional[builtins.str] = None,
|
108
|
+
namespace: Optional[builtins.str] = None,
|
108
109
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
|
109
110
|
"""
|
110
111
|
## Example Usage
|
@@ -127,9 +128,9 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
127
128
|
```
|
128
129
|
|
129
130
|
|
130
|
-
:param str backend: The path to the PKI secret backend to
|
131
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
131
132
|
read the issuers from, with no leading or trailing `/`s.
|
132
|
-
:param str namespace: The namespace of the target resource.
|
133
|
+
:param builtins.str namespace: The namespace of the target resource.
|
133
134
|
The value should not contain leading or trailing forward slashes.
|
134
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
136
|
*Available only for Vault Enterprise*.
|
@@ -147,8 +148,8 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
147
148
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
149
|
keys=pulumi.get(__ret__, 'keys'),
|
149
150
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
|
-
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
151
|
+
def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
152
153
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
153
154
|
"""
|
154
155
|
## Example Usage
|
@@ -171,9 +172,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
171
172
|
```
|
172
173
|
|
173
174
|
|
174
|
-
:param str backend: The path to the PKI secret backend to
|
175
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
175
176
|
read the issuers from, with no leading or trailing `/`s.
|
176
|
-
:param str namespace: The namespace of the target resource.
|
177
|
+
:param builtins.str namespace: The namespace of the target resource.
|
177
178
|
The value should not contain leading or trailing forward slashes.
|
178
179
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
180
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -51,12 +52,12 @@ class GetBackendKeyResult:
|
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def backend(self) -> str:
|
55
|
+
def backend(self) -> builtins.str:
|
55
56
|
return pulumi.get(self, "backend")
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def id(self) -> str:
|
60
|
+
def id(self) -> builtins.str:
|
60
61
|
"""
|
61
62
|
The provider-assigned unique ID for this managed resource.
|
62
63
|
"""
|
@@ -64,7 +65,7 @@ class GetBackendKeyResult:
|
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter(name="keyId")
|
67
|
-
def key_id(self) -> str:
|
68
|
+
def key_id(self) -> builtins.str:
|
68
69
|
"""
|
69
70
|
ID of the key.
|
70
71
|
"""
|
@@ -72,7 +73,7 @@ class GetBackendKeyResult:
|
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter(name="keyName")
|
75
|
-
def key_name(self) -> str:
|
76
|
+
def key_name(self) -> builtins.str:
|
76
77
|
"""
|
77
78
|
Name of the key.
|
78
79
|
"""
|
@@ -80,12 +81,12 @@ class GetBackendKeyResult:
|
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter(name="keyRef")
|
83
|
-
def key_ref(self) -> str:
|
84
|
+
def key_ref(self) -> builtins.str:
|
84
85
|
return pulumi.get(self, "key_ref")
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="keyType")
|
88
|
-
def key_type(self) -> str:
|
89
|
+
def key_type(self) -> builtins.str:
|
89
90
|
"""
|
90
91
|
Type of the key.
|
91
92
|
"""
|
@@ -93,7 +94,7 @@ class GetBackendKeyResult:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[str]:
|
97
|
+
def namespace(self) -> Optional[builtins.str]:
|
97
98
|
return pulumi.get(self, "namespace")
|
98
99
|
|
99
100
|
|
@@ -112,9 +113,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
|
|
112
113
|
namespace=self.namespace)
|
113
114
|
|
114
115
|
|
115
|
-
def get_backend_key(backend: Optional[str] = None,
|
116
|
-
key_ref: Optional[str] = None,
|
117
|
-
namespace: Optional[str] = None,
|
116
|
+
def get_backend_key(backend: Optional[builtins.str] = None,
|
117
|
+
key_ref: Optional[builtins.str] = None,
|
118
|
+
namespace: Optional[builtins.str] = None,
|
118
119
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
|
119
120
|
"""
|
120
121
|
## Example Usage
|
@@ -138,10 +139,10 @@ def get_backend_key(backend: Optional[str] = None,
|
|
138
139
|
```
|
139
140
|
|
140
141
|
|
141
|
-
:param str backend: The path to the PKI secret backend to
|
142
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
142
143
|
read the key from, with no leading or trailing `/`s.
|
143
|
-
:param str key_ref: Reference to an existing key.
|
144
|
-
:param str namespace: The namespace of the target resource.
|
144
|
+
:param builtins.str key_ref: Reference to an existing key.
|
145
|
+
:param builtins.str namespace: The namespace of the target resource.
|
145
146
|
The value should not contain leading or trailing forward slashes.
|
146
147
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
148
|
*Available only for Vault Enterprise*.
|
@@ -161,9 +162,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
161
162
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
162
163
|
key_type=pulumi.get(__ret__, 'key_type'),
|
163
164
|
namespace=pulumi.get(__ret__, 'namespace'))
|
164
|
-
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
|
-
key_ref: Optional[pulumi.Input[str]] = None,
|
166
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
165
|
+
def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
166
|
+
key_ref: Optional[pulumi.Input[builtins.str]] = None,
|
167
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
167
168
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
168
169
|
"""
|
169
170
|
## Example Usage
|
@@ -187,10 +188,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
187
188
|
```
|
188
189
|
|
189
190
|
|
190
|
-
:param str backend: The path to the PKI secret backend to
|
191
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
191
192
|
read the key from, with no leading or trailing `/`s.
|
192
|
-
:param str key_ref: Reference to an existing key.
|
193
|
-
:param str namespace: The namespace of the target resource.
|
193
|
+
:param builtins.str key_ref: Reference to an existing key.
|
194
|
+
:param builtins.str namespace: The namespace of the target resource.
|
194
195
|
The value should not contain leading or trailing forward slashes.
|
195
196
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
197
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,12 +49,12 @@ class GetBackendKeysResult:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def backend(self) -> str:
|
52
|
+
def backend(self) -> builtins.str:
|
52
53
|
return pulumi.get(self, "backend")
|
53
54
|
|
54
55
|
@property
|
55
56
|
@pulumi.getter
|
56
|
-
def id(self) -> str:
|
57
|
+
def id(self) -> builtins.str:
|
57
58
|
"""
|
58
59
|
The provider-assigned unique ID for this managed resource.
|
59
60
|
"""
|
@@ -61,7 +62,7 @@ class GetBackendKeysResult:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter(name="keyInfo")
|
64
|
-
def key_info(self) -> Mapping[str, str]:
|
65
|
+
def key_info(self) -> Mapping[str, builtins.str]:
|
65
66
|
"""
|
66
67
|
Map of key strings read from Vault.
|
67
68
|
"""
|
@@ -69,7 +70,7 @@ class GetBackendKeysResult:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="keyInfoJson")
|
72
|
-
def key_info_json(self) -> str:
|
73
|
+
def key_info_json(self) -> builtins.str:
|
73
74
|
"""
|
74
75
|
JSON-encoded key data read from Vault.
|
75
76
|
"""
|
@@ -77,7 +78,7 @@ class GetBackendKeysResult:
|
|
77
78
|
|
78
79
|
@property
|
79
80
|
@pulumi.getter
|
80
|
-
def keys(self) -> Sequence[str]:
|
81
|
+
def keys(self) -> Sequence[builtins.str]:
|
81
82
|
"""
|
82
83
|
Keys used under the backend path.
|
83
84
|
"""
|
@@ -85,7 +86,7 @@ class GetBackendKeysResult:
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def namespace(self) -> Optional[str]:
|
89
|
+
def namespace(self) -> Optional[builtins.str]:
|
89
90
|
return pulumi.get(self, "namespace")
|
90
91
|
|
91
92
|
|
@@ -103,8 +104,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
|
|
103
104
|
namespace=self.namespace)
|
104
105
|
|
105
106
|
|
106
|
-
def get_backend_keys(backend: Optional[str] = None,
|
107
|
-
namespace: Optional[str] = None,
|
107
|
+
def get_backend_keys(backend: Optional[builtins.str] = None,
|
108
|
+
namespace: Optional[builtins.str] = None,
|
108
109
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
|
109
110
|
"""
|
110
111
|
## Example Usage
|
@@ -127,9 +128,9 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
127
128
|
```
|
128
129
|
|
129
130
|
|
130
|
-
:param str backend: The path to the PKI secret backend to
|
131
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
131
132
|
read the keys from, with no leading or trailing `/`s.
|
132
|
-
:param str namespace: The namespace of the target resource.
|
133
|
+
:param builtins.str namespace: The namespace of the target resource.
|
133
134
|
The value should not contain leading or trailing forward slashes.
|
134
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
136
|
*Available only for Vault Enterprise*.
|
@@ -147,8 +148,8 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
147
148
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
149
|
keys=pulumi.get(__ret__, 'keys'),
|
149
150
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
|
-
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
151
|
+
def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
152
153
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
153
154
|
"""
|
154
155
|
## Example Usage
|
@@ -171,9 +172,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
171
172
|
```
|
172
173
|
|
173
174
|
|
174
|
-
:param str backend: The path to the PKI secret backend to
|
175
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
175
176
|
read the keys from, with no leading or trailing `/`s.
|
176
|
-
:param str namespace: The namespace of the target resource.
|
177
|
+
:param builtins.str namespace: The namespace of the target resource.
|
177
178
|
The value should not contain leading or trailing forward slashes.
|
178
179
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
180
|
*Available only for Vault Enterprise*.
|