pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -56,64 +55,64 @@ class GetBackendCertMetadataResult:
|
|
56
55
|
raise TypeError("Expected argument 'serial_number' to be a str")
|
57
56
|
pulumi.set(__self__, "serial_number", serial_number)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter(name="certMetadata")
|
61
|
-
def cert_metadata(self) ->
|
60
|
+
def cert_metadata(self) -> _builtins.str:
|
62
61
|
"""
|
63
62
|
The metadata associated with the certificate
|
64
63
|
"""
|
65
64
|
return pulumi.get(self, "cert_metadata")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter
|
69
|
-
def expiration(self) ->
|
68
|
+
def expiration(self) -> _builtins.str:
|
70
69
|
"""
|
71
70
|
The expiration date of the certificate in unix epoch format
|
72
71
|
"""
|
73
72
|
return pulumi.get(self, "expiration")
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter
|
77
|
-
def id(self) ->
|
76
|
+
def id(self) -> _builtins.str:
|
78
77
|
"""
|
79
78
|
The provider-assigned unique ID for this managed resource.
|
80
79
|
"""
|
81
80
|
return pulumi.get(self, "id")
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="issuerId")
|
85
|
-
def issuer_id(self) ->
|
84
|
+
def issuer_id(self) -> _builtins.str:
|
86
85
|
"""
|
87
86
|
ID of the issuer.
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "issuer_id")
|
90
89
|
|
91
|
-
@property
|
90
|
+
@_builtins.property
|
92
91
|
@pulumi.getter
|
93
|
-
def namespace(self) -> Optional[
|
92
|
+
def namespace(self) -> Optional[_builtins.str]:
|
94
93
|
return pulumi.get(self, "namespace")
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter
|
98
|
-
def path(self) ->
|
97
|
+
def path(self) -> _builtins.str:
|
99
98
|
return pulumi.get(self, "path")
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter
|
103
|
-
def role(self) ->
|
102
|
+
def role(self) -> _builtins.str:
|
104
103
|
"""
|
105
104
|
The role used to create the certificate
|
106
105
|
"""
|
107
106
|
return pulumi.get(self, "role")
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def serial(self) ->
|
110
|
+
def serial(self) -> _builtins.str:
|
112
111
|
return pulumi.get(self, "serial")
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="serialNumber")
|
116
|
-
def serial_number(self) ->
|
115
|
+
def serial_number(self) -> _builtins.str:
|
117
116
|
"""
|
118
117
|
The serial number
|
119
118
|
"""
|
@@ -137,9 +136,9 @@ class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
|
|
137
136
|
serial_number=self.serial_number)
|
138
137
|
|
139
138
|
|
140
|
-
def get_backend_cert_metadata(namespace: Optional[
|
141
|
-
path: Optional[
|
142
|
-
serial: Optional[
|
139
|
+
def get_backend_cert_metadata(namespace: Optional[_builtins.str] = None,
|
140
|
+
path: Optional[_builtins.str] = None,
|
141
|
+
serial: Optional[_builtins.str] = None,
|
143
142
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
|
144
143
|
"""
|
145
144
|
## Example Usage
|
@@ -152,13 +151,13 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
|
|
152
151
|
path="pki",
|
153
152
|
type="pki",
|
154
153
|
description="PKI secret engine mount")
|
155
|
-
root = vault.
|
154
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
156
155
|
backend=pki.path,
|
157
156
|
type="internal",
|
158
157
|
common_name="example",
|
159
158
|
ttl="86400",
|
160
159
|
issuer_name="example")
|
161
|
-
test_secret_backend_role = vault.
|
160
|
+
test_secret_backend_role = vault.pkisecret.SecretBackendRole("test",
|
162
161
|
backend=test_vault_pki_secret_backend_root_cert["backend"],
|
163
162
|
name="test",
|
164
163
|
allowed_domains=["test.my.domain"],
|
@@ -170,7 +169,7 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
|
|
170
169
|
"KeyEncipherment",
|
171
170
|
],
|
172
171
|
no_store_metadata=False)
|
173
|
-
test_secret_backend_cert = vault.
|
172
|
+
test_secret_backend_cert = vault.pkisecret.SecretBackendCert("test",
|
174
173
|
backend=test_secret_backend_role.backend,
|
175
174
|
name=test_secret_backend_role.name,
|
176
175
|
common_name="cert.test.my.domain",
|
@@ -182,13 +181,13 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
|
|
182
181
|
```
|
183
182
|
|
184
183
|
|
185
|
-
:param
|
184
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
186
185
|
The value should not contain leading or trailing forward slashes.
|
187
186
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
188
187
|
*Available only for Vault Enterprise*.
|
189
|
-
:param
|
188
|
+
:param _builtins.str path: The path to the PKI secret backend to
|
190
189
|
read the cert metadata from, with no leading or trailing `/`s.
|
191
|
-
:param
|
190
|
+
:param _builtins.str serial: Specifies the serial of the certificate whose metadata to read.
|
192
191
|
"""
|
193
192
|
__args__ = dict()
|
194
193
|
__args__['namespace'] = namespace
|
@@ -207,9 +206,9 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
|
|
207
206
|
role=pulumi.get(__ret__, 'role'),
|
208
207
|
serial=pulumi.get(__ret__, 'serial'),
|
209
208
|
serial_number=pulumi.get(__ret__, 'serial_number'))
|
210
|
-
def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[
|
211
|
-
path: Optional[pulumi.Input[
|
212
|
-
serial: Optional[pulumi.Input[
|
209
|
+
def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
210
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
211
|
+
serial: Optional[pulumi.Input[_builtins.str]] = None,
|
213
212
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
|
214
213
|
"""
|
215
214
|
## Example Usage
|
@@ -222,13 +221,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
|
|
222
221
|
path="pki",
|
223
222
|
type="pki",
|
224
223
|
description="PKI secret engine mount")
|
225
|
-
root = vault.
|
224
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
226
225
|
backend=pki.path,
|
227
226
|
type="internal",
|
228
227
|
common_name="example",
|
229
228
|
ttl="86400",
|
230
229
|
issuer_name="example")
|
231
|
-
test_secret_backend_role = vault.
|
230
|
+
test_secret_backend_role = vault.pkisecret.SecretBackendRole("test",
|
232
231
|
backend=test_vault_pki_secret_backend_root_cert["backend"],
|
233
232
|
name="test",
|
234
233
|
allowed_domains=["test.my.domain"],
|
@@ -240,7 +239,7 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
|
|
240
239
|
"KeyEncipherment",
|
241
240
|
],
|
242
241
|
no_store_metadata=False)
|
243
|
-
test_secret_backend_cert = vault.
|
242
|
+
test_secret_backend_cert = vault.pkisecret.SecretBackendCert("test",
|
244
243
|
backend=test_secret_backend_role.backend,
|
245
244
|
name=test_secret_backend_role.name,
|
246
245
|
common_name="cert.test.my.domain",
|
@@ -252,13 +251,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
|
|
252
251
|
```
|
253
252
|
|
254
253
|
|
255
|
-
:param
|
254
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
256
255
|
The value should not contain leading or trailing forward slashes.
|
257
256
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
258
257
|
*Available only for Vault Enterprise*.
|
259
|
-
:param
|
258
|
+
:param _builtins.str path: The path to the PKI secret backend to
|
260
259
|
read the cert metadata from, with no leading or trailing `/`s.
|
261
|
-
:param
|
260
|
+
:param _builtins.str serial: Specifies the serial of the certificate whose metadata to read.
|
262
261
|
"""
|
263
262
|
__args__ = dict()
|
264
263
|
__args__['namespace'] = namespace
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -60,57 +59,57 @@ class GetBackendConfigCmpv2Result:
|
|
60
59
|
raise TypeError("Expected argument 'namespace' to be a str")
|
61
60
|
pulumi.set(__self__, "namespace", namespace)
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter(name="auditFields")
|
65
|
-
def audit_fields(self) -> Sequence[
|
64
|
+
def audit_fields(self) -> Sequence[_builtins.str]:
|
66
65
|
return pulumi.get(self, "audit_fields")
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
69
|
def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
|
71
70
|
return pulumi.get(self, "authenticators")
|
72
71
|
|
73
|
-
@property
|
72
|
+
@_builtins.property
|
74
73
|
@pulumi.getter
|
75
|
-
def backend(self) ->
|
74
|
+
def backend(self) -> _builtins.str:
|
76
75
|
return pulumi.get(self, "backend")
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter(name="defaultPathPolicy")
|
80
|
-
def default_path_policy(self) ->
|
79
|
+
def default_path_policy(self) -> _builtins.str:
|
81
80
|
return pulumi.get(self, "default_path_policy")
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="disabledValidations")
|
85
|
-
def disabled_validations(self) -> Optional[Sequence[
|
84
|
+
def disabled_validations(self) -> Optional[Sequence[_builtins.str]]:
|
86
85
|
return pulumi.get(self, "disabled_validations")
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="enableSentinelParsing")
|
90
|
-
def enable_sentinel_parsing(self) ->
|
89
|
+
def enable_sentinel_parsing(self) -> _builtins.bool:
|
91
90
|
return pulumi.get(self, "enable_sentinel_parsing")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def enabled(self) ->
|
94
|
+
def enabled(self) -> _builtins.bool:
|
96
95
|
return pulumi.get(self, "enabled")
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter
|
100
|
-
def id(self) ->
|
99
|
+
def id(self) -> _builtins.str:
|
101
100
|
"""
|
102
101
|
The provider-assigned unique ID for this managed resource.
|
103
102
|
"""
|
104
103
|
return pulumi.get(self, "id")
|
105
104
|
|
106
|
-
@property
|
105
|
+
@_builtins.property
|
107
106
|
@pulumi.getter(name="lastUpdated")
|
108
|
-
def last_updated(self) ->
|
107
|
+
def last_updated(self) -> _builtins.str:
|
109
108
|
return pulumi.get(self, "last_updated")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def namespace(self) -> Optional[
|
112
|
+
def namespace(self) -> Optional[_builtins.str]:
|
114
113
|
return pulumi.get(self, "namespace")
|
115
114
|
|
116
115
|
|
@@ -132,9 +131,9 @@ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
|
|
132
131
|
namespace=self.namespace)
|
133
132
|
|
134
133
|
|
135
|
-
def get_backend_config_cmpv2(backend: Optional[
|
136
|
-
disabled_validations: Optional[Sequence[
|
137
|
-
namespace: Optional[
|
134
|
+
def get_backend_config_cmpv2(backend: Optional[_builtins.str] = None,
|
135
|
+
disabled_validations: Optional[Sequence[_builtins.str]] = None,
|
136
|
+
namespace: Optional[_builtins.str] = None,
|
138
137
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
|
139
138
|
"""
|
140
139
|
## Example Usage
|
@@ -151,12 +150,12 @@ def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
|
|
151
150
|
```
|
152
151
|
|
153
152
|
|
154
|
-
:param
|
153
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
155
154
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
156
155
|
|
157
156
|
# Attributes Reference
|
158
|
-
:param Sequence[
|
159
|
-
:param
|
157
|
+
:param Sequence[_builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
158
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
160
159
|
The value should not contain leading or trailing forward slashes.
|
161
160
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
162
161
|
*Available only for Vault Enterprise*.
|
@@ -179,9 +178,9 @@ def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
|
|
179
178
|
id=pulumi.get(__ret__, 'id'),
|
180
179
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
181
180
|
namespace=pulumi.get(__ret__, 'namespace'))
|
182
|
-
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[
|
183
|
-
disabled_validations: Optional[pulumi.Input[Optional[Sequence[
|
184
|
-
namespace: Optional[pulumi.Input[Optional[
|
181
|
+
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
182
|
+
disabled_validations: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
183
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
185
184
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
|
186
185
|
"""
|
187
186
|
## Example Usage
|
@@ -198,12 +197,12 @@ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[builtins.str]
|
|
198
197
|
```
|
199
198
|
|
200
199
|
|
201
|
-
:param
|
200
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
202
201
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
203
202
|
|
204
203
|
# Attributes Reference
|
205
|
-
:param Sequence[
|
206
|
-
:param
|
204
|
+
:param Sequence[_builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
205
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
207
206
|
The value should not contain leading or trailing forward slashes.
|
208
207
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
209
208
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -63,15 +62,15 @@ class GetBackendConfigEstResult:
|
|
63
62
|
raise TypeError("Expected argument 'namespace' to be a str")
|
64
63
|
pulumi.set(__self__, "namespace", namespace)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter(name="auditFields")
|
68
|
-
def audit_fields(self) -> Sequence[
|
67
|
+
def audit_fields(self) -> Sequence[_builtins.str]:
|
69
68
|
"""
|
70
69
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "audit_fields")
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter
|
76
75
|
def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
|
77
76
|
"""
|
@@ -79,70 +78,70 @@ class GetBackendConfigEstResult:
|
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "authenticators")
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter
|
84
|
-
def backend(self) ->
|
83
|
+
def backend(self) -> _builtins.str:
|
85
84
|
return pulumi.get(self, "backend")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter(name="defaultMount")
|
89
|
-
def default_mount(self) ->
|
88
|
+
def default_mount(self) -> _builtins.bool:
|
90
89
|
"""
|
91
90
|
If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "default_mount")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter(name="defaultPathPolicy")
|
97
|
-
def default_path_policy(self) ->
|
96
|
+
def default_path_policy(self) -> _builtins.str:
|
98
97
|
"""
|
99
98
|
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
100
99
|
"""
|
101
100
|
return pulumi.get(self, "default_path_policy")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="enableSentinelParsing")
|
105
|
-
def enable_sentinel_parsing(self) ->
|
104
|
+
def enable_sentinel_parsing(self) -> _builtins.bool:
|
106
105
|
"""
|
107
106
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "enable_sentinel_parsing")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def enabled(self) ->
|
112
|
+
def enabled(self) -> _builtins.bool:
|
114
113
|
"""
|
115
114
|
Specifies whether EST is enabled.
|
116
115
|
"""
|
117
116
|
return pulumi.get(self, "enabled")
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter
|
121
|
-
def id(self) ->
|
120
|
+
def id(self) -> _builtins.str:
|
122
121
|
"""
|
123
122
|
The provider-assigned unique ID for this managed resource.
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "id")
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter(name="labelToPathPolicy")
|
129
|
-
def label_to_path_policy(self) -> Mapping[str,
|
128
|
+
def label_to_path_policy(self) -> Mapping[str, _builtins.str]:
|
130
129
|
"""
|
131
130
|
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
132
131
|
"""
|
133
132
|
return pulumi.get(self, "label_to_path_policy")
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="lastUpdated")
|
137
|
-
def last_updated(self) ->
|
136
|
+
def last_updated(self) -> _builtins.str:
|
138
137
|
"""
|
139
138
|
A read-only timestamp representing the last time the configuration was updated.
|
140
139
|
"""
|
141
140
|
return pulumi.get(self, "last_updated")
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter
|
145
|
-
def namespace(self) -> Optional[
|
144
|
+
def namespace(self) -> Optional[_builtins.str]:
|
146
145
|
return pulumi.get(self, "namespace")
|
147
146
|
|
148
147
|
|
@@ -165,8 +164,8 @@ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
|
|
165
164
|
namespace=self.namespace)
|
166
165
|
|
167
166
|
|
168
|
-
def get_backend_config_est(backend: Optional[
|
169
|
-
namespace: Optional[
|
167
|
+
def get_backend_config_est(backend: Optional[_builtins.str] = None,
|
168
|
+
namespace: Optional[_builtins.str] = None,
|
170
169
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
|
171
170
|
"""
|
172
171
|
## Example Usage
|
@@ -183,9 +182,9 @@ def get_backend_config_est(backend: Optional[builtins.str] = None,
|
|
183
182
|
```
|
184
183
|
|
185
184
|
|
186
|
-
:param
|
185
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
187
186
|
read the EST configuration from, with no leading or trailing `/`s.
|
188
|
-
:param
|
187
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
189
188
|
The value should not contain leading or trailing forward slashes.
|
190
189
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
191
190
|
*Available only for Vault Enterprise*.
|
@@ -208,8 +207,8 @@ def get_backend_config_est(backend: Optional[builtins.str] = None,
|
|
208
207
|
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
209
208
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
210
209
|
namespace=pulumi.get(__ret__, 'namespace'))
|
211
|
-
def get_backend_config_est_output(backend: Optional[pulumi.Input[
|
212
|
-
namespace: Optional[pulumi.Input[Optional[
|
210
|
+
def get_backend_config_est_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
211
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
213
212
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
214
213
|
"""
|
215
214
|
## Example Usage
|
@@ -226,9 +225,9 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[builtins.str]]
|
|
226
225
|
```
|
227
226
|
|
228
227
|
|
229
|
-
:param
|
228
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
230
229
|
read the EST configuration from, with no leading or trailing `/`s.
|
231
|
-
:param
|
230
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
232
231
|
The value should not contain leading or trailing forward slashes.
|
233
232
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
234
233
|
*Available only for Vault Enterprise*.
|