pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,12 +49,12 @@ class GetBackendIssuersResult:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def backend(self) -> str:
|
52
|
+
def backend(self) -> builtins.str:
|
52
53
|
return pulumi.get(self, "backend")
|
53
54
|
|
54
55
|
@property
|
55
56
|
@pulumi.getter
|
56
|
-
def id(self) -> str:
|
57
|
+
def id(self) -> builtins.str:
|
57
58
|
"""
|
58
59
|
The provider-assigned unique ID for this managed resource.
|
59
60
|
"""
|
@@ -61,7 +62,7 @@ class GetBackendIssuersResult:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter(name="keyInfo")
|
64
|
-
def key_info(self) -> Mapping[str, str]:
|
65
|
+
def key_info(self) -> Mapping[str, builtins.str]:
|
65
66
|
"""
|
66
67
|
Map of issuer strings read from Vault.
|
67
68
|
"""
|
@@ -69,7 +70,7 @@ class GetBackendIssuersResult:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="keyInfoJson")
|
72
|
-
def key_info_json(self) -> str:
|
73
|
+
def key_info_json(self) -> builtins.str:
|
73
74
|
"""
|
74
75
|
JSON-encoded issuer data read from Vault.
|
75
76
|
"""
|
@@ -77,7 +78,7 @@ class GetBackendIssuersResult:
|
|
77
78
|
|
78
79
|
@property
|
79
80
|
@pulumi.getter
|
80
|
-
def keys(self) -> Sequence[str]:
|
81
|
+
def keys(self) -> Sequence[builtins.str]:
|
81
82
|
"""
|
82
83
|
Keys used by issuers under the backend path.
|
83
84
|
"""
|
@@ -85,7 +86,7 @@ class GetBackendIssuersResult:
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def namespace(self) -> Optional[str]:
|
89
|
+
def namespace(self) -> Optional[builtins.str]:
|
89
90
|
return pulumi.get(self, "namespace")
|
90
91
|
|
91
92
|
|
@@ -103,8 +104,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
|
|
103
104
|
namespace=self.namespace)
|
104
105
|
|
105
106
|
|
106
|
-
def get_backend_issuers(backend: Optional[str] = None,
|
107
|
-
namespace: Optional[str] = None,
|
107
|
+
def get_backend_issuers(backend: Optional[builtins.str] = None,
|
108
|
+
namespace: Optional[builtins.str] = None,
|
108
109
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
|
109
110
|
"""
|
110
111
|
## Example Usage
|
@@ -127,9 +128,9 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
127
128
|
```
|
128
129
|
|
129
130
|
|
130
|
-
:param str backend: The path to the PKI secret backend to
|
131
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
131
132
|
read the issuers from, with no leading or trailing `/`s.
|
132
|
-
:param str namespace: The namespace of the target resource.
|
133
|
+
:param builtins.str namespace: The namespace of the target resource.
|
133
134
|
The value should not contain leading or trailing forward slashes.
|
134
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
136
|
*Available only for Vault Enterprise*.
|
@@ -147,8 +148,8 @@ def get_backend_issuers(backend: Optional[str] = None,
|
|
147
148
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
149
|
keys=pulumi.get(__ret__, 'keys'),
|
149
150
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
|
-
def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
151
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
151
|
+
def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
152
153
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
153
154
|
"""
|
154
155
|
## Example Usage
|
@@ -171,9 +172,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
|
|
171
172
|
```
|
172
173
|
|
173
174
|
|
174
|
-
:param str backend: The path to the PKI secret backend to
|
175
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
175
176
|
read the issuers from, with no leading or trailing `/`s.
|
176
|
-
:param str namespace: The namespace of the target resource.
|
177
|
+
:param builtins.str namespace: The namespace of the target resource.
|
177
178
|
The value should not contain leading or trailing forward slashes.
|
178
179
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
180
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -51,12 +52,12 @@ class GetBackendKeyResult:
|
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def backend(self) -> str:
|
55
|
+
def backend(self) -> builtins.str:
|
55
56
|
return pulumi.get(self, "backend")
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def id(self) -> str:
|
60
|
+
def id(self) -> builtins.str:
|
60
61
|
"""
|
61
62
|
The provider-assigned unique ID for this managed resource.
|
62
63
|
"""
|
@@ -64,7 +65,7 @@ class GetBackendKeyResult:
|
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter(name="keyId")
|
67
|
-
def key_id(self) -> str:
|
68
|
+
def key_id(self) -> builtins.str:
|
68
69
|
"""
|
69
70
|
ID of the key.
|
70
71
|
"""
|
@@ -72,7 +73,7 @@ class GetBackendKeyResult:
|
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter(name="keyName")
|
75
|
-
def key_name(self) -> str:
|
76
|
+
def key_name(self) -> builtins.str:
|
76
77
|
"""
|
77
78
|
Name of the key.
|
78
79
|
"""
|
@@ -80,12 +81,12 @@ class GetBackendKeyResult:
|
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter(name="keyRef")
|
83
|
-
def key_ref(self) -> str:
|
84
|
+
def key_ref(self) -> builtins.str:
|
84
85
|
return pulumi.get(self, "key_ref")
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="keyType")
|
88
|
-
def key_type(self) -> str:
|
89
|
+
def key_type(self) -> builtins.str:
|
89
90
|
"""
|
90
91
|
Type of the key.
|
91
92
|
"""
|
@@ -93,7 +94,7 @@ class GetBackendKeyResult:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[str]:
|
97
|
+
def namespace(self) -> Optional[builtins.str]:
|
97
98
|
return pulumi.get(self, "namespace")
|
98
99
|
|
99
100
|
|
@@ -112,9 +113,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
|
|
112
113
|
namespace=self.namespace)
|
113
114
|
|
114
115
|
|
115
|
-
def get_backend_key(backend: Optional[str] = None,
|
116
|
-
key_ref: Optional[str] = None,
|
117
|
-
namespace: Optional[str] = None,
|
116
|
+
def get_backend_key(backend: Optional[builtins.str] = None,
|
117
|
+
key_ref: Optional[builtins.str] = None,
|
118
|
+
namespace: Optional[builtins.str] = None,
|
118
119
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
|
119
120
|
"""
|
120
121
|
## Example Usage
|
@@ -138,10 +139,10 @@ def get_backend_key(backend: Optional[str] = None,
|
|
138
139
|
```
|
139
140
|
|
140
141
|
|
141
|
-
:param str backend: The path to the PKI secret backend to
|
142
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
142
143
|
read the key from, with no leading or trailing `/`s.
|
143
|
-
:param str key_ref: Reference to an existing key.
|
144
|
-
:param str namespace: The namespace of the target resource.
|
144
|
+
:param builtins.str key_ref: Reference to an existing key.
|
145
|
+
:param builtins.str namespace: The namespace of the target resource.
|
145
146
|
The value should not contain leading or trailing forward slashes.
|
146
147
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
148
|
*Available only for Vault Enterprise*.
|
@@ -161,9 +162,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
161
162
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
162
163
|
key_type=pulumi.get(__ret__, 'key_type'),
|
163
164
|
namespace=pulumi.get(__ret__, 'namespace'))
|
164
|
-
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
|
-
key_ref: Optional[pulumi.Input[str]] = None,
|
166
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
165
|
+
def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
166
|
+
key_ref: Optional[pulumi.Input[builtins.str]] = None,
|
167
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
167
168
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
168
169
|
"""
|
169
170
|
## Example Usage
|
@@ -187,10 +188,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
187
188
|
```
|
188
189
|
|
189
190
|
|
190
|
-
:param str backend: The path to the PKI secret backend to
|
191
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
191
192
|
read the key from, with no leading or trailing `/`s.
|
192
|
-
:param str key_ref: Reference to an existing key.
|
193
|
-
:param str namespace: The namespace of the target resource.
|
193
|
+
:param builtins.str key_ref: Reference to an existing key.
|
194
|
+
:param builtins.str namespace: The namespace of the target resource.
|
194
195
|
The value should not contain leading or trailing forward slashes.
|
195
196
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
197
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,12 +49,12 @@ class GetBackendKeysResult:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def backend(self) -> str:
|
52
|
+
def backend(self) -> builtins.str:
|
52
53
|
return pulumi.get(self, "backend")
|
53
54
|
|
54
55
|
@property
|
55
56
|
@pulumi.getter
|
56
|
-
def id(self) -> str:
|
57
|
+
def id(self) -> builtins.str:
|
57
58
|
"""
|
58
59
|
The provider-assigned unique ID for this managed resource.
|
59
60
|
"""
|
@@ -61,7 +62,7 @@ class GetBackendKeysResult:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter(name="keyInfo")
|
64
|
-
def key_info(self) -> Mapping[str, str]:
|
65
|
+
def key_info(self) -> Mapping[str, builtins.str]:
|
65
66
|
"""
|
66
67
|
Map of key strings read from Vault.
|
67
68
|
"""
|
@@ -69,7 +70,7 @@ class GetBackendKeysResult:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="keyInfoJson")
|
72
|
-
def key_info_json(self) -> str:
|
73
|
+
def key_info_json(self) -> builtins.str:
|
73
74
|
"""
|
74
75
|
JSON-encoded key data read from Vault.
|
75
76
|
"""
|
@@ -77,7 +78,7 @@ class GetBackendKeysResult:
|
|
77
78
|
|
78
79
|
@property
|
79
80
|
@pulumi.getter
|
80
|
-
def keys(self) -> Sequence[str]:
|
81
|
+
def keys(self) -> Sequence[builtins.str]:
|
81
82
|
"""
|
82
83
|
Keys used under the backend path.
|
83
84
|
"""
|
@@ -85,7 +86,7 @@ class GetBackendKeysResult:
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter
|
88
|
-
def namespace(self) -> Optional[str]:
|
89
|
+
def namespace(self) -> Optional[builtins.str]:
|
89
90
|
return pulumi.get(self, "namespace")
|
90
91
|
|
91
92
|
|
@@ -103,8 +104,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
|
|
103
104
|
namespace=self.namespace)
|
104
105
|
|
105
106
|
|
106
|
-
def get_backend_keys(backend: Optional[str] = None,
|
107
|
-
namespace: Optional[str] = None,
|
107
|
+
def get_backend_keys(backend: Optional[builtins.str] = None,
|
108
|
+
namespace: Optional[builtins.str] = None,
|
108
109
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
|
109
110
|
"""
|
110
111
|
## Example Usage
|
@@ -127,9 +128,9 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
127
128
|
```
|
128
129
|
|
129
130
|
|
130
|
-
:param str backend: The path to the PKI secret backend to
|
131
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
131
132
|
read the keys from, with no leading or trailing `/`s.
|
132
|
-
:param str namespace: The namespace of the target resource.
|
133
|
+
:param builtins.str namespace: The namespace of the target resource.
|
133
134
|
The value should not contain leading or trailing forward slashes.
|
134
135
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
136
|
*Available only for Vault Enterprise*.
|
@@ -147,8 +148,8 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
147
148
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
148
149
|
keys=pulumi.get(__ret__, 'keys'),
|
149
150
|
namespace=pulumi.get(__ret__, 'namespace'))
|
150
|
-
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
151
|
+
def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
152
153
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
153
154
|
"""
|
154
155
|
## Example Usage
|
@@ -171,9 +172,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
171
172
|
```
|
172
173
|
|
173
174
|
|
174
|
-
:param str backend: The path to the PKI secret backend to
|
175
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
175
176
|
read the keys from, with no leading or trailing `/`s.
|
176
|
-
:param str namespace: The namespace of the target resource.
|
177
|
+
:param builtins.str namespace: The namespace of the target resource.
|
177
178
|
The value should not contain leading or trailing forward slashes.
|
178
179
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
180
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -25,16 +26,16 @@ __all__ = [
|
|
25
26
|
@pulumi.output_type
|
26
27
|
class BackendConfigCmpv2Authenticators(dict):
|
27
28
|
def __init__(__self__, *,
|
28
|
-
cert: Optional[Mapping[str, str]] = None):
|
29
|
+
cert: Optional[Mapping[str, builtins.str]] = None):
|
29
30
|
"""
|
30
|
-
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
:param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
32
|
"""
|
32
33
|
if cert is not None:
|
33
34
|
pulumi.set(__self__, "cert", cert)
|
34
35
|
|
35
36
|
@property
|
36
37
|
@pulumi.getter
|
37
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
38
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
38
39
|
"""
|
39
40
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
40
41
|
"""
|
@@ -44,11 +45,11 @@ class BackendConfigCmpv2Authenticators(dict):
|
|
44
45
|
@pulumi.output_type
|
45
46
|
class BackendConfigEstAuthenticators(dict):
|
46
47
|
def __init__(__self__, *,
|
47
|
-
cert: Optional[Mapping[str, str]] = None,
|
48
|
-
userpass: Optional[Mapping[str, str]] = None):
|
48
|
+
cert: Optional[Mapping[str, builtins.str]] = None,
|
49
|
+
userpass: Optional[Mapping[str, builtins.str]] = None):
|
49
50
|
"""
|
50
|
-
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
51
|
-
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
51
|
+
:param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
52
|
+
:param Mapping[str, builtins.str] userpass: "The accessor (required) property for user pass auth backends".
|
52
53
|
"""
|
53
54
|
if cert is not None:
|
54
55
|
pulumi.set(__self__, "cert", cert)
|
@@ -57,7 +58,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
61
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
61
62
|
"""
|
62
63
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
63
64
|
"""
|
@@ -65,7 +66,7 @@ class BackendConfigEstAuthenticators(dict):
|
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter
|
68
|
-
def userpass(self) -> Optional[Mapping[str, str]]:
|
69
|
+
def userpass(self) -> Optional[Mapping[str, builtins.str]]:
|
69
70
|
"""
|
70
71
|
"The accessor (required) property for user pass auth backends".
|
71
72
|
"""
|
@@ -75,13 +76,13 @@ class BackendConfigEstAuthenticators(dict):
|
|
75
76
|
@pulumi.output_type
|
76
77
|
class SecretBackendRolePolicyIdentifier(dict):
|
77
78
|
def __init__(__self__, *,
|
78
|
-
oid: str,
|
79
|
-
cps: Optional[str] = None,
|
80
|
-
notice: Optional[str] = None):
|
79
|
+
oid: builtins.str,
|
80
|
+
cps: Optional[builtins.str] = None,
|
81
|
+
notice: Optional[builtins.str] = None):
|
81
82
|
"""
|
82
|
-
:param str oid: The OID for the policy identifier
|
83
|
-
:param str cps: The URL of the CPS for the policy identifier
|
84
|
-
:param str notice: A notice for the policy identifier
|
83
|
+
:param builtins.str oid: The OID for the policy identifier
|
84
|
+
:param builtins.str cps: The URL of the CPS for the policy identifier
|
85
|
+
:param builtins.str notice: A notice for the policy identifier
|
85
86
|
"""
|
86
87
|
pulumi.set(__self__, "oid", oid)
|
87
88
|
if cps is not None:
|
@@ -91,7 +92,7 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def oid(self) -> str:
|
95
|
+
def oid(self) -> builtins.str:
|
95
96
|
"""
|
96
97
|
The OID for the policy identifier
|
97
98
|
"""
|
@@ -99,7 +100,7 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter
|
102
|
-
def cps(self) -> Optional[str]:
|
103
|
+
def cps(self) -> Optional[builtins.str]:
|
103
104
|
"""
|
104
105
|
The URL of the CPS for the policy identifier
|
105
106
|
"""
|
@@ -107,7 +108,7 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def notice(self) -> Optional[str]:
|
111
|
+
def notice(self) -> Optional[builtins.str]:
|
111
112
|
"""
|
112
113
|
A notice for the policy identifier
|
113
114
|
"""
|
@@ -117,16 +118,16 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
117
118
|
@pulumi.output_type
|
118
119
|
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
119
120
|
def __init__(__self__, *,
|
120
|
-
cert: Optional[Mapping[str, str]] = None):
|
121
|
+
cert: Optional[Mapping[str, builtins.str]] = None):
|
121
122
|
"""
|
122
|
-
:param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
|
123
|
+
:param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
123
124
|
"""
|
124
125
|
if cert is not None:
|
125
126
|
pulumi.set(__self__, "cert", cert)
|
126
127
|
|
127
128
|
@property
|
128
129
|
@pulumi.getter
|
129
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
130
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
130
131
|
"""
|
131
132
|
The accessor and cert_role properties for cert auth backends
|
132
133
|
"""
|
@@ -136,11 +137,11 @@ class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
|
136
137
|
@pulumi.output_type
|
137
138
|
class GetBackendConfigEstAuthenticatorResult(dict):
|
138
139
|
def __init__(__self__, *,
|
139
|
-
cert: Optional[Mapping[str, str]] = None,
|
140
|
-
userpass: Optional[Mapping[str, str]] = None):
|
140
|
+
cert: Optional[Mapping[str, builtins.str]] = None,
|
141
|
+
userpass: Optional[Mapping[str, builtins.str]] = None):
|
141
142
|
"""
|
142
|
-
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
143
|
-
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
143
|
+
:param Mapping[str, builtins.str] cert: "The accessor and cert_role properties for cert auth backends".
|
144
|
+
:param Mapping[str, builtins.str] userpass: "The accessor property for user pass auth backends".
|
144
145
|
"""
|
145
146
|
if cert is not None:
|
146
147
|
pulumi.set(__self__, "cert", cert)
|
@@ -149,7 +150,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
149
150
|
|
150
151
|
@property
|
151
152
|
@pulumi.getter
|
152
|
-
def cert(self) -> Optional[Mapping[str, str]]:
|
153
|
+
def cert(self) -> Optional[Mapping[str, builtins.str]]:
|
153
154
|
"""
|
154
155
|
"The accessor and cert_role properties for cert auth backends".
|
155
156
|
"""
|
@@ -157,7 +158,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter
|
160
|
-
def userpass(self) -> Optional[Mapping[str, str]]:
|
161
|
+
def userpass(self) -> Optional[Mapping[str, builtins.str]]:
|
161
162
|
"""
|
162
163
|
"The accessor property for user pass auth backends".
|
163
164
|
"""
|