pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,25 +20,25 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendCaArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: Optional[pulumi.Input[str]] = None,
|
23
|
-
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
24
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
25
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
27
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
28
|
-
public_key: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
key_bits: Optional[pulumi.Input[builtins.int]] = None,
|
26
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
private_key: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
public_key: Optional[pulumi.Input[builtins.str]] = None):
|
29
30
|
"""
|
30
31
|
The set of arguments for constructing a SecretBackendCa resource.
|
31
|
-
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
32
|
-
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
33
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
34
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
35
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
32
|
+
:param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
33
|
+
:param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
34
|
+
:param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
35
|
+
:param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
36
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
36
37
|
The value should not contain leading or trailing forward slashes.
|
37
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
39
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
40
|
-
:param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
40
|
+
:param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
41
|
+
:param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
41
42
|
"""
|
42
43
|
if backend is not None:
|
43
44
|
pulumi.set(__self__, "backend", backend)
|
@@ -56,55 +57,55 @@ class SecretBackendCaArgs:
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
60
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
60
61
|
"""
|
61
62
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
62
63
|
"""
|
63
64
|
return pulumi.get(self, "backend")
|
64
65
|
|
65
66
|
@backend.setter
|
66
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
67
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
67
68
|
pulumi.set(self, "backend", value)
|
68
69
|
|
69
70
|
@property
|
70
71
|
@pulumi.getter(name="generateSigningKey")
|
71
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[bool]]:
|
72
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
|
72
73
|
"""
|
73
74
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
74
75
|
"""
|
75
76
|
return pulumi.get(self, "generate_signing_key")
|
76
77
|
|
77
78
|
@generate_signing_key.setter
|
78
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
79
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
|
79
80
|
pulumi.set(self, "generate_signing_key", value)
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter(name="keyBits")
|
83
|
-
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
84
|
+
def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
|
84
85
|
"""
|
85
86
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
86
87
|
"""
|
87
88
|
return pulumi.get(self, "key_bits")
|
88
89
|
|
89
90
|
@key_bits.setter
|
90
|
-
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
91
|
+
def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
|
91
92
|
pulumi.set(self, "key_bits", value)
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter(name="keyType")
|
95
|
-
def key_type(self) -> Optional[pulumi.Input[str]]:
|
96
|
+
def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
96
97
|
"""
|
97
98
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
98
99
|
"""
|
99
100
|
return pulumi.get(self, "key_type")
|
100
101
|
|
101
102
|
@key_type.setter
|
102
|
-
def key_type(self, value: Optional[pulumi.Input[str]]):
|
103
|
+
def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
103
104
|
pulumi.set(self, "key_type", value)
|
104
105
|
|
105
106
|
@property
|
106
107
|
@pulumi.getter
|
107
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
108
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
108
109
|
"""
|
109
110
|
The namespace to provision the resource in.
|
110
111
|
The value should not contain leading or trailing forward slashes.
|
@@ -114,56 +115,56 @@ class SecretBackendCaArgs:
|
|
114
115
|
return pulumi.get(self, "namespace")
|
115
116
|
|
116
117
|
@namespace.setter
|
117
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
118
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
118
119
|
pulumi.set(self, "namespace", value)
|
119
120
|
|
120
121
|
@property
|
121
122
|
@pulumi.getter(name="privateKey")
|
122
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
123
|
+
def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
123
124
|
"""
|
124
125
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
125
126
|
"""
|
126
127
|
return pulumi.get(self, "private_key")
|
127
128
|
|
128
129
|
@private_key.setter
|
129
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
130
|
+
def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
130
131
|
pulumi.set(self, "private_key", value)
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter(name="publicKey")
|
134
|
-
def public_key(self) -> Optional[pulumi.Input[str]]:
|
135
|
+
def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
135
136
|
"""
|
136
137
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
137
138
|
"""
|
138
139
|
return pulumi.get(self, "public_key")
|
139
140
|
|
140
141
|
@public_key.setter
|
141
|
-
def public_key(self, value: Optional[pulumi.Input[str]]):
|
142
|
+
def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
142
143
|
pulumi.set(self, "public_key", value)
|
143
144
|
|
144
145
|
|
145
146
|
@pulumi.input_type
|
146
147
|
class _SecretBackendCaState:
|
147
148
|
def __init__(__self__, *,
|
148
|
-
backend: Optional[pulumi.Input[str]] = None,
|
149
|
-
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
150
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
151
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
152
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
153
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
154
|
-
public_key: Optional[pulumi.Input[str]] = None):
|
149
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
150
|
+
generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
|
151
|
+
key_bits: Optional[pulumi.Input[builtins.int]] = None,
|
152
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
153
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
154
|
+
private_key: Optional[pulumi.Input[builtins.str]] = None,
|
155
|
+
public_key: Optional[pulumi.Input[builtins.str]] = None):
|
155
156
|
"""
|
156
157
|
Input properties used for looking up and filtering SecretBackendCa resources.
|
157
|
-
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
158
|
-
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
159
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
160
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
161
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
158
|
+
:param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
159
|
+
:param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
160
|
+
:param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
161
|
+
:param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
162
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
162
163
|
The value should not contain leading or trailing forward slashes.
|
163
164
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
164
165
|
*Available only for Vault Enterprise*.
|
165
|
-
:param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
166
|
-
:param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
166
|
+
:param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
167
|
+
:param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
167
168
|
"""
|
168
169
|
if backend is not None:
|
169
170
|
pulumi.set(__self__, "backend", backend)
|
@@ -182,55 +183,55 @@ class _SecretBackendCaState:
|
|
182
183
|
|
183
184
|
@property
|
184
185
|
@pulumi.getter
|
185
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
186
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
186
187
|
"""
|
187
188
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
188
189
|
"""
|
189
190
|
return pulumi.get(self, "backend")
|
190
191
|
|
191
192
|
@backend.setter
|
192
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
193
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
193
194
|
pulumi.set(self, "backend", value)
|
194
195
|
|
195
196
|
@property
|
196
197
|
@pulumi.getter(name="generateSigningKey")
|
197
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[bool]]:
|
198
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
|
198
199
|
"""
|
199
200
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
200
201
|
"""
|
201
202
|
return pulumi.get(self, "generate_signing_key")
|
202
203
|
|
203
204
|
@generate_signing_key.setter
|
204
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
205
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
|
205
206
|
pulumi.set(self, "generate_signing_key", value)
|
206
207
|
|
207
208
|
@property
|
208
209
|
@pulumi.getter(name="keyBits")
|
209
|
-
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
210
|
+
def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
|
210
211
|
"""
|
211
212
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
212
213
|
"""
|
213
214
|
return pulumi.get(self, "key_bits")
|
214
215
|
|
215
216
|
@key_bits.setter
|
216
|
-
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
217
|
+
def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
|
217
218
|
pulumi.set(self, "key_bits", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="keyType")
|
221
|
-
def key_type(self) -> Optional[pulumi.Input[str]]:
|
222
|
+
def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
222
223
|
"""
|
223
224
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
224
225
|
"""
|
225
226
|
return pulumi.get(self, "key_type")
|
226
227
|
|
227
228
|
@key_type.setter
|
228
|
-
def key_type(self, value: Optional[pulumi.Input[str]]):
|
229
|
+
def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
229
230
|
pulumi.set(self, "key_type", value)
|
230
231
|
|
231
232
|
@property
|
232
233
|
@pulumi.getter
|
233
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
234
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
234
235
|
"""
|
235
236
|
The namespace to provision the resource in.
|
236
237
|
The value should not contain leading or trailing forward slashes.
|
@@ -240,31 +241,31 @@ class _SecretBackendCaState:
|
|
240
241
|
return pulumi.get(self, "namespace")
|
241
242
|
|
242
243
|
@namespace.setter
|
243
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
244
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
244
245
|
pulumi.set(self, "namespace", value)
|
245
246
|
|
246
247
|
@property
|
247
248
|
@pulumi.getter(name="privateKey")
|
248
|
-
def private_key(self) -> Optional[pulumi.Input[str]]:
|
249
|
+
def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
249
250
|
"""
|
250
251
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
251
252
|
"""
|
252
253
|
return pulumi.get(self, "private_key")
|
253
254
|
|
254
255
|
@private_key.setter
|
255
|
-
def private_key(self, value: Optional[pulumi.Input[str]]):
|
256
|
+
def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
256
257
|
pulumi.set(self, "private_key", value)
|
257
258
|
|
258
259
|
@property
|
259
260
|
@pulumi.getter(name="publicKey")
|
260
|
-
def public_key(self) -> Optional[pulumi.Input[str]]:
|
261
|
+
def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
261
262
|
"""
|
262
263
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
263
264
|
"""
|
264
265
|
return pulumi.get(self, "public_key")
|
265
266
|
|
266
267
|
@public_key.setter
|
267
|
-
def public_key(self, value: Optional[pulumi.Input[str]]):
|
268
|
+
def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
268
269
|
pulumi.set(self, "public_key", value)
|
269
270
|
|
270
271
|
|
@@ -273,13 +274,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
273
274
|
def __init__(__self__,
|
274
275
|
resource_name: str,
|
275
276
|
opts: Optional[pulumi.ResourceOptions] = None,
|
276
|
-
backend: Optional[pulumi.Input[str]] = None,
|
277
|
-
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
278
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
279
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
280
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
281
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
282
|
-
public_key: Optional[pulumi.Input[str]] = None,
|
277
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
278
|
+
generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
|
279
|
+
key_bits: Optional[pulumi.Input[builtins.int]] = None,
|
280
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
281
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
282
|
+
private_key: Optional[pulumi.Input[builtins.str]] = None,
|
283
|
+
public_key: Optional[pulumi.Input[builtins.str]] = None,
|
283
284
|
__props__=None):
|
284
285
|
"""
|
285
286
|
Provides a resource to manage CA information in an SSH secret backend
|
@@ -305,16 +306,16 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
305
306
|
|
306
307
|
:param str resource_name: The name of the resource.
|
307
308
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
308
|
-
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
309
|
-
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
310
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
311
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
312
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
309
|
+
:param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
310
|
+
:param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
311
|
+
:param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
312
|
+
:param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
313
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
313
314
|
The value should not contain leading or trailing forward slashes.
|
314
315
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
315
316
|
*Available only for Vault Enterprise*.
|
316
|
-
:param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
317
|
-
:param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
317
|
+
:param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
318
|
+
:param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
318
319
|
"""
|
319
320
|
...
|
320
321
|
@overload
|
@@ -359,13 +360,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
359
360
|
def _internal_init(__self__,
|
360
361
|
resource_name: str,
|
361
362
|
opts: Optional[pulumi.ResourceOptions] = None,
|
362
|
-
backend: Optional[pulumi.Input[str]] = None,
|
363
|
-
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
364
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
365
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
366
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
367
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
368
|
-
public_key: Optional[pulumi.Input[str]] = None,
|
363
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
364
|
+
generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
|
365
|
+
key_bits: Optional[pulumi.Input[builtins.int]] = None,
|
366
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
367
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
368
|
+
private_key: Optional[pulumi.Input[builtins.str]] = None,
|
369
|
+
public_key: Optional[pulumi.Input[builtins.str]] = None,
|
369
370
|
__props__=None):
|
370
371
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
371
372
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -394,13 +395,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
394
395
|
def get(resource_name: str,
|
395
396
|
id: pulumi.Input[str],
|
396
397
|
opts: Optional[pulumi.ResourceOptions] = None,
|
397
|
-
backend: Optional[pulumi.Input[str]] = None,
|
398
|
-
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
399
|
-
key_bits: Optional[pulumi.Input[int]] = None,
|
400
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
401
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
402
|
-
private_key: Optional[pulumi.Input[str]] = None,
|
403
|
-
public_key: Optional[pulumi.Input[str]] = None) -> 'SecretBackendCa':
|
398
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
399
|
+
generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
|
400
|
+
key_bits: Optional[pulumi.Input[builtins.int]] = None,
|
401
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
402
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
403
|
+
private_key: Optional[pulumi.Input[builtins.str]] = None,
|
404
|
+
public_key: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendCa':
|
404
405
|
"""
|
405
406
|
Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
|
406
407
|
properties used to qualify the lookup.
|
@@ -408,16 +409,16 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
408
409
|
:param str resource_name: The unique name of the resulting resource.
|
409
410
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
410
411
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
411
|
-
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
412
|
-
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
413
|
-
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
414
|
-
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
415
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
412
|
+
:param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
413
|
+
:param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
414
|
+
:param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
415
|
+
:param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
416
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
416
417
|
The value should not contain leading or trailing forward slashes.
|
417
418
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
419
|
*Available only for Vault Enterprise*.
|
419
|
-
:param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
420
|
-
:param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
420
|
+
:param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
421
|
+
:param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
421
422
|
"""
|
422
423
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
423
424
|
|
@@ -434,7 +435,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
434
435
|
|
435
436
|
@property
|
436
437
|
@pulumi.getter
|
437
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
438
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
438
439
|
"""
|
439
440
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
440
441
|
"""
|
@@ -442,7 +443,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
442
443
|
|
443
444
|
@property
|
444
445
|
@pulumi.getter(name="generateSigningKey")
|
445
|
-
def generate_signing_key(self) -> pulumi.Output[Optional[bool]]:
|
446
|
+
def generate_signing_key(self) -> pulumi.Output[Optional[builtins.bool]]:
|
446
447
|
"""
|
447
448
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
448
449
|
"""
|
@@ -450,7 +451,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter(name="keyBits")
|
453
|
-
def key_bits(self) -> pulumi.Output[Optional[int]]:
|
454
|
+
def key_bits(self) -> pulumi.Output[Optional[builtins.int]]:
|
454
455
|
"""
|
455
456
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
456
457
|
"""
|
@@ -458,7 +459,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
458
459
|
|
459
460
|
@property
|
460
461
|
@pulumi.getter(name="keyType")
|
461
|
-
def key_type(self) -> pulumi.Output[Optional[str]]:
|
462
|
+
def key_type(self) -> pulumi.Output[Optional[builtins.str]]:
|
462
463
|
"""
|
463
464
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
464
465
|
"""
|
@@ -466,7 +467,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
466
467
|
|
467
468
|
@property
|
468
469
|
@pulumi.getter
|
469
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
470
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
470
471
|
"""
|
471
472
|
The namespace to provision the resource in.
|
472
473
|
The value should not contain leading or trailing forward slashes.
|
@@ -477,7 +478,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
477
478
|
|
478
479
|
@property
|
479
480
|
@pulumi.getter(name="privateKey")
|
480
|
-
def private_key(self) -> pulumi.Output[str]:
|
481
|
+
def private_key(self) -> pulumi.Output[builtins.str]:
|
481
482
|
"""
|
482
483
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
483
484
|
"""
|
@@ -485,7 +486,7 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
485
486
|
|
486
487
|
@property
|
487
488
|
@pulumi.getter(name="publicKey")
|
488
|
-
def public_key(self) -> pulumi.Output[str]:
|
489
|
+
def public_key(self) -> pulumi.Output[builtins.str]:
|
489
490
|
"""
|
490
491
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
491
492
|
"""
|