pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -28,7 +27,7 @@ class GetBackendConfigScepResult:
|
|
28
27
|
"""
|
29
28
|
A collection of values returned by getBackendConfigScep.
|
30
29
|
"""
|
31
|
-
def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, namespace=None, restrict_ca_chain_to_issuer=None):
|
30
|
+
def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, log_level=None, namespace=None, restrict_ca_chain_to_issuer=None):
|
32
31
|
if allowed_digest_algorithms and not isinstance(allowed_digest_algorithms, list):
|
33
32
|
raise TypeError("Expected argument 'allowed_digest_algorithms' to be a list")
|
34
33
|
pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
|
@@ -56,6 +55,9 @@ class GetBackendConfigScepResult:
|
|
56
55
|
if last_updated and not isinstance(last_updated, str):
|
57
56
|
raise TypeError("Expected argument 'last_updated' to be a str")
|
58
57
|
pulumi.set(__self__, "last_updated", last_updated)
|
58
|
+
if log_level and not isinstance(log_level, str):
|
59
|
+
raise TypeError("Expected argument 'log_level' to be a str")
|
60
|
+
pulumi.set(__self__, "log_level", log_level)
|
59
61
|
if namespace and not isinstance(namespace, str):
|
60
62
|
raise TypeError("Expected argument 'namespace' to be a str")
|
61
63
|
pulumi.set(__self__, "namespace", namespace)
|
@@ -63,23 +65,23 @@ class GetBackendConfigScepResult:
|
|
63
65
|
raise TypeError("Expected argument 'restrict_ca_chain_to_issuer' to be a bool")
|
64
66
|
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
65
67
|
|
66
|
-
@property
|
68
|
+
@_builtins.property
|
67
69
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
68
|
-
def allowed_digest_algorithms(self) -> Sequence[
|
70
|
+
def allowed_digest_algorithms(self) -> Sequence[_builtins.str]:
|
69
71
|
"""
|
70
72
|
List of allowed digest algorithms for SCEP requests.
|
71
73
|
"""
|
72
74
|
return pulumi.get(self, "allowed_digest_algorithms")
|
73
75
|
|
74
|
-
@property
|
76
|
+
@_builtins.property
|
75
77
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
76
|
-
def allowed_encryption_algorithms(self) -> Sequence[
|
78
|
+
def allowed_encryption_algorithms(self) -> Sequence[_builtins.str]:
|
77
79
|
"""
|
78
80
|
List of allowed encryption algorithms for SCEP requests.
|
79
81
|
"""
|
80
82
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
81
83
|
|
82
|
-
@property
|
84
|
+
@_builtins.property
|
83
85
|
@pulumi.getter
|
84
86
|
def authenticators(self) -> Sequence['outputs.GetBackendConfigScepAuthenticatorResult']:
|
85
87
|
"""
|
@@ -87,28 +89,28 @@ class GetBackendConfigScepResult:
|
|
87
89
|
"""
|
88
90
|
return pulumi.get(self, "authenticators")
|
89
91
|
|
90
|
-
@property
|
92
|
+
@_builtins.property
|
91
93
|
@pulumi.getter
|
92
|
-
def backend(self) ->
|
94
|
+
def backend(self) -> _builtins.str:
|
93
95
|
return pulumi.get(self, "backend")
|
94
96
|
|
95
|
-
@property
|
97
|
+
@_builtins.property
|
96
98
|
@pulumi.getter(name="defaultPathPolicy")
|
97
|
-
def default_path_policy(self) ->
|
99
|
+
def default_path_policy(self) -> _builtins.str:
|
98
100
|
"""
|
99
101
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
100
102
|
"""
|
101
103
|
return pulumi.get(self, "default_path_policy")
|
102
104
|
|
103
|
-
@property
|
105
|
+
@_builtins.property
|
104
106
|
@pulumi.getter
|
105
|
-
def enabled(self) ->
|
107
|
+
def enabled(self) -> _builtins.bool:
|
106
108
|
"""
|
107
109
|
Specifies whether SCEP is enabled.
|
108
110
|
"""
|
109
111
|
return pulumi.get(self, "enabled")
|
110
112
|
|
111
|
-
@property
|
113
|
+
@_builtins.property
|
112
114
|
@pulumi.getter(name="externalValidations")
|
113
115
|
def external_validations(self) -> Sequence['outputs.GetBackendConfigScepExternalValidationResult']:
|
114
116
|
"""
|
@@ -116,30 +118,38 @@ class GetBackendConfigScepResult:
|
|
116
118
|
"""
|
117
119
|
return pulumi.get(self, "external_validations")
|
118
120
|
|
119
|
-
@property
|
121
|
+
@_builtins.property
|
120
122
|
@pulumi.getter
|
121
|
-
def id(self) ->
|
123
|
+
def id(self) -> _builtins.str:
|
122
124
|
"""
|
123
125
|
The provider-assigned unique ID for this managed resource.
|
124
126
|
"""
|
125
127
|
return pulumi.get(self, "id")
|
126
128
|
|
127
|
-
@property
|
129
|
+
@_builtins.property
|
128
130
|
@pulumi.getter(name="lastUpdated")
|
129
|
-
def last_updated(self) ->
|
131
|
+
def last_updated(self) -> _builtins.str:
|
130
132
|
"""
|
131
133
|
A read-only timestamp representing the last time the configuration was updated.
|
132
134
|
"""
|
133
135
|
return pulumi.get(self, "last_updated")
|
134
136
|
|
135
|
-
@property
|
137
|
+
@_builtins.property
|
138
|
+
@pulumi.getter(name="logLevel")
|
139
|
+
def log_level(self) -> Optional[_builtins.str]:
|
140
|
+
"""
|
141
|
+
The level of logging verbosity, affects only SCEP logs on this mount.
|
142
|
+
"""
|
143
|
+
return pulumi.get(self, "log_level")
|
144
|
+
|
145
|
+
@_builtins.property
|
136
146
|
@pulumi.getter
|
137
|
-
def namespace(self) -> Optional[
|
147
|
+
def namespace(self) -> Optional[_builtins.str]:
|
138
148
|
return pulumi.get(self, "namespace")
|
139
149
|
|
140
|
-
@property
|
150
|
+
@_builtins.property
|
141
151
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
142
|
-
def restrict_ca_chain_to_issuer(self) ->
|
152
|
+
def restrict_ca_chain_to_issuer(self) -> _builtins.bool:
|
143
153
|
"""
|
144
154
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
145
155
|
"""
|
@@ -161,12 +171,14 @@ class AwaitableGetBackendConfigScepResult(GetBackendConfigScepResult):
|
|
161
171
|
external_validations=self.external_validations,
|
162
172
|
id=self.id,
|
163
173
|
last_updated=self.last_updated,
|
174
|
+
log_level=self.log_level,
|
164
175
|
namespace=self.namespace,
|
165
176
|
restrict_ca_chain_to_issuer=self.restrict_ca_chain_to_issuer)
|
166
177
|
|
167
178
|
|
168
|
-
def get_backend_config_scep(backend: Optional[
|
169
|
-
|
179
|
+
def get_backend_config_scep(backend: Optional[_builtins.str] = None,
|
180
|
+
log_level: Optional[_builtins.str] = None,
|
181
|
+
namespace: Optional[_builtins.str] = None,
|
170
182
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigScepResult:
|
171
183
|
"""
|
172
184
|
## Example Usage
|
@@ -183,15 +195,17 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
|
|
183
195
|
```
|
184
196
|
|
185
197
|
|
186
|
-
:param
|
198
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
187
199
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
188
|
-
:param
|
200
|
+
:param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
201
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
189
202
|
The value should not contain leading or trailing forward slashes.
|
190
203
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
191
204
|
*Available only for Vault Enterprise*.
|
192
205
|
"""
|
193
206
|
__args__ = dict()
|
194
207
|
__args__['backend'] = backend
|
208
|
+
__args__['logLevel'] = log_level
|
195
209
|
__args__['namespace'] = namespace
|
196
210
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
197
211
|
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult).value
|
@@ -206,10 +220,12 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
|
|
206
220
|
external_validations=pulumi.get(__ret__, 'external_validations'),
|
207
221
|
id=pulumi.get(__ret__, 'id'),
|
208
222
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
223
|
+
log_level=pulumi.get(__ret__, 'log_level'),
|
209
224
|
namespace=pulumi.get(__ret__, 'namespace'),
|
210
225
|
restrict_ca_chain_to_issuer=pulumi.get(__ret__, 'restrict_ca_chain_to_issuer'))
|
211
|
-
def get_backend_config_scep_output(backend: Optional[pulumi.Input[
|
212
|
-
|
226
|
+
def get_backend_config_scep_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
227
|
+
log_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
228
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
213
229
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigScepResult]:
|
214
230
|
"""
|
215
231
|
## Example Usage
|
@@ -226,15 +242,17 @@ def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]]
|
|
226
242
|
```
|
227
243
|
|
228
244
|
|
229
|
-
:param
|
245
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
230
246
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
231
|
-
:param
|
247
|
+
:param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
248
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
232
249
|
The value should not contain leading or trailing forward slashes.
|
233
250
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
234
251
|
*Available only for Vault Enterprise*.
|
235
252
|
"""
|
236
253
|
__args__ = dict()
|
237
254
|
__args__['backend'] = backend
|
255
|
+
__args__['logLevel'] = log_level
|
238
256
|
__args__['namespace'] = namespace
|
239
257
|
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
240
258
|
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult)
|
@@ -248,5 +266,6 @@ def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]]
|
|
248
266
|
external_validations=pulumi.get(__response__, 'external_validations'),
|
249
267
|
id=pulumi.get(__response__, 'id'),
|
250
268
|
last_updated=pulumi.get(__response__, 'last_updated'),
|
269
|
+
log_level=pulumi.get(__response__, 'log_level'),
|
251
270
|
namespace=pulumi.get(__response__, 'namespace'),
|
252
271
|
restrict_ca_chain_to_issuer=pulumi.get(__response__, 'restrict_ca_chain_to_issuer')))
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -77,30 +76,30 @@ class GetBackendIssuerResult:
|
|
77
76
|
raise TypeError("Expected argument 'usage' to be a str")
|
78
77
|
pulumi.set(__self__, "usage", usage)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def backend(self) ->
|
81
|
+
def backend(self) -> _builtins.str:
|
83
82
|
return pulumi.get(self, "backend")
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="caChains")
|
87
|
-
def ca_chains(self) -> Sequence[
|
86
|
+
def ca_chains(self) -> Sequence[_builtins.str]:
|
88
87
|
"""
|
89
88
|
The CA chain as a list of format specific certificates.
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "ca_chains")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def certificate(self) ->
|
94
|
+
def certificate(self) -> _builtins.str:
|
96
95
|
"""
|
97
96
|
Certificate associated with this issuer.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "certificate")
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
103
|
-
def disable_critical_extension_checks(self) -> Optional[
|
102
|
+
def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
|
104
103
|
"""
|
105
104
|
This determines whether this
|
106
105
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -108,9 +107,9 @@ class GetBackendIssuerResult:
|
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "disable_critical_extension_checks")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter(name="disableNameChecks")
|
113
|
-
def disable_name_checks(self) -> Optional[
|
112
|
+
def disable_name_checks(self) -> Optional[_builtins.bool]:
|
114
113
|
"""
|
115
114
|
This determines whether this issuer is able
|
116
115
|
to issue certificates where the chain of trust (including the final issued
|
@@ -119,9 +118,9 @@ class GetBackendIssuerResult:
|
|
119
118
|
"""
|
120
119
|
return pulumi.get(self, "disable_name_checks")
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="disableNameConstraintChecks")
|
124
|
-
def disable_name_constraint_checks(self) -> Optional[
|
123
|
+
def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
|
125
124
|
"""
|
126
125
|
This determines whether this
|
127
126
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -130,9 +129,9 @@ class GetBackendIssuerResult:
|
|
130
129
|
"""
|
131
130
|
return pulumi.get(self, "disable_name_constraint_checks")
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="disablePathLengthChecks")
|
135
|
-
def disable_path_length_checks(self) -> Optional[
|
134
|
+
def disable_path_length_checks(self) -> Optional[_builtins.bool]:
|
136
135
|
"""
|
137
136
|
This determines whether this issuer
|
138
137
|
is able to issue certificates where the chain of trust (including the final
|
@@ -141,68 +140,68 @@ class GetBackendIssuerResult:
|
|
141
140
|
"""
|
142
141
|
return pulumi.get(self, "disable_path_length_checks")
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter
|
146
|
-
def id(self) ->
|
145
|
+
def id(self) -> _builtins.str:
|
147
146
|
"""
|
148
147
|
The provider-assigned unique ID for this managed resource.
|
149
148
|
"""
|
150
149
|
return pulumi.get(self, "id")
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter(name="issuerId")
|
154
|
-
def issuer_id(self) ->
|
153
|
+
def issuer_id(self) -> _builtins.str:
|
155
154
|
"""
|
156
155
|
ID of the issuer.
|
157
156
|
"""
|
158
157
|
return pulumi.get(self, "issuer_id")
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="issuerName")
|
162
|
-
def issuer_name(self) ->
|
161
|
+
def issuer_name(self) -> _builtins.str:
|
163
162
|
"""
|
164
163
|
Name of the issuer.
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "issuer_name")
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter(name="issuerRef")
|
170
|
-
def issuer_ref(self) ->
|
169
|
+
def issuer_ref(self) -> _builtins.str:
|
171
170
|
return pulumi.get(self, "issuer_ref")
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="keyId")
|
175
|
-
def key_id(self) ->
|
174
|
+
def key_id(self) -> _builtins.str:
|
176
175
|
"""
|
177
176
|
ID of the key used by the issuer.
|
178
177
|
"""
|
179
178
|
return pulumi.get(self, "key_id")
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter(name="leafNotAfterBehavior")
|
183
|
-
def leaf_not_after_behavior(self) ->
|
182
|
+
def leaf_not_after_behavior(self) -> _builtins.str:
|
184
183
|
"""
|
185
184
|
Behavior of a leaf's NotAfter field during issuance.
|
186
185
|
"""
|
187
186
|
return pulumi.get(self, "leaf_not_after_behavior")
|
188
187
|
|
189
|
-
@property
|
188
|
+
@_builtins.property
|
190
189
|
@pulumi.getter(name="manualChains")
|
191
|
-
def manual_chains(self) -> Sequence[
|
190
|
+
def manual_chains(self) -> Sequence[_builtins.str]:
|
192
191
|
"""
|
193
192
|
Chain of issuer references to build this issuer's computed
|
194
193
|
CAChain field from, when non-empty.
|
195
194
|
"""
|
196
195
|
return pulumi.get(self, "manual_chains")
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
@pulumi.getter
|
200
|
-
def namespace(self) -> Optional[
|
199
|
+
def namespace(self) -> Optional[_builtins.str]:
|
201
200
|
return pulumi.get(self, "namespace")
|
202
201
|
|
203
|
-
@property
|
202
|
+
@_builtins.property
|
204
203
|
@pulumi.getter
|
205
|
-
def usage(self) ->
|
204
|
+
def usage(self) -> _builtins.str:
|
206
205
|
"""
|
207
206
|
Allowed usages for this issuer.
|
208
207
|
"""
|
@@ -233,13 +232,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
233
232
|
usage=self.usage)
|
234
233
|
|
235
234
|
|
236
|
-
def get_backend_issuer(backend: Optional[
|
237
|
-
disable_critical_extension_checks: Optional[
|
238
|
-
disable_name_checks: Optional[
|
239
|
-
disable_name_constraint_checks: Optional[
|
240
|
-
disable_path_length_checks: Optional[
|
241
|
-
issuer_ref: Optional[
|
242
|
-
namespace: Optional[
|
235
|
+
def get_backend_issuer(backend: Optional[_builtins.str] = None,
|
236
|
+
disable_critical_extension_checks: Optional[_builtins.bool] = None,
|
237
|
+
disable_name_checks: Optional[_builtins.bool] = None,
|
238
|
+
disable_name_constraint_checks: Optional[_builtins.bool] = None,
|
239
|
+
disable_path_length_checks: Optional[_builtins.bool] = None,
|
240
|
+
issuer_ref: Optional[_builtins.str] = None,
|
241
|
+
namespace: Optional[_builtins.str] = None,
|
243
242
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
244
243
|
"""
|
245
244
|
## Example Usage
|
@@ -252,7 +251,7 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
252
251
|
path="pki",
|
253
252
|
type="pki",
|
254
253
|
description="PKI secret engine mount")
|
255
|
-
root = vault.
|
254
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
256
255
|
backend=pki.path,
|
257
256
|
type="internal",
|
258
257
|
common_name="example",
|
@@ -263,25 +262,25 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
263
262
|
```
|
264
263
|
|
265
264
|
|
266
|
-
:param
|
265
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
267
266
|
read the issuer from, with no leading or trailing `/`s.
|
268
|
-
:param
|
267
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
269
268
|
issuer is able to issue certificates where the chain of trust (including the
|
270
269
|
issued certificate) contain critical extensions not processed by Vault.
|
271
|
-
:param
|
270
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
272
271
|
to issue certificates where the chain of trust (including the final issued
|
273
272
|
certificate) contains a link in which the subject of the issuing certificate
|
274
273
|
does not match the named issuer of the certificate it signed.
|
275
|
-
:param
|
274
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
276
275
|
issuer is able to issue certificates where the chain of trust (including the
|
277
276
|
final issued certificate) violates the name constraints critical extension of
|
278
277
|
one of the issuer certificates in the chain.
|
279
|
-
:param
|
278
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
280
279
|
is able to issue certificates where the chain of trust (including the final
|
281
280
|
issued certificate) is longer than allowed by a certificate authority in that
|
282
281
|
chain.
|
283
|
-
:param
|
284
|
-
:param
|
282
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
283
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
285
284
|
The value should not contain leading or trailing forward slashes.
|
286
285
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
287
286
|
*Available only for Vault Enterprise*.
|
@@ -314,13 +313,13 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
314
313
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
315
314
|
namespace=pulumi.get(__ret__, 'namespace'),
|
316
315
|
usage=pulumi.get(__ret__, 'usage'))
|
317
|
-
def get_backend_issuer_output(backend: Optional[pulumi.Input[
|
318
|
-
disable_critical_extension_checks: Optional[pulumi.Input[Optional[
|
319
|
-
disable_name_checks: Optional[pulumi.Input[Optional[
|
320
|
-
disable_name_constraint_checks: Optional[pulumi.Input[Optional[
|
321
|
-
disable_path_length_checks: Optional[pulumi.Input[Optional[
|
322
|
-
issuer_ref: Optional[pulumi.Input[
|
323
|
-
namespace: Optional[pulumi.Input[Optional[
|
316
|
+
def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
317
|
+
disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
318
|
+
disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
319
|
+
disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
320
|
+
disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
321
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
324
323
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
325
324
|
"""
|
326
325
|
## Example Usage
|
@@ -333,7 +332,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
|
|
333
332
|
path="pki",
|
334
333
|
type="pki",
|
335
334
|
description="PKI secret engine mount")
|
336
|
-
root = vault.
|
335
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
337
336
|
backend=pki.path,
|
338
337
|
type="internal",
|
339
338
|
common_name="example",
|
@@ -344,25 +343,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
|
|
344
343
|
```
|
345
344
|
|
346
345
|
|
347
|
-
:param
|
346
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
348
347
|
read the issuer from, with no leading or trailing `/`s.
|
349
|
-
:param
|
348
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
350
349
|
issuer is able to issue certificates where the chain of trust (including the
|
351
350
|
issued certificate) contain critical extensions not processed by Vault.
|
352
|
-
:param
|
351
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
353
352
|
to issue certificates where the chain of trust (including the final issued
|
354
353
|
certificate) contains a link in which the subject of the issuing certificate
|
355
354
|
does not match the named issuer of the certificate it signed.
|
356
|
-
:param
|
355
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
357
356
|
issuer is able to issue certificates where the chain of trust (including the
|
358
357
|
final issued certificate) violates the name constraints critical extension of
|
359
358
|
one of the issuer certificates in the chain.
|
360
|
-
:param
|
359
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
361
360
|
is able to issue certificates where the chain of trust (including the final
|
362
361
|
issued certificate) is longer than allowed by a certificate authority in that
|
363
362
|
chain.
|
364
|
-
:param
|
365
|
-
:param
|
363
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
364
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
366
365
|
The value should not contain leading or trailing forward slashes.
|
367
366
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
367
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -47,46 +46,46 @@ class GetBackendIssuersResult:
|
|
47
46
|
raise TypeError("Expected argument 'namespace' to be a str")
|
48
47
|
pulumi.set(__self__, "namespace", namespace)
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
@pulumi.getter
|
52
|
-
def backend(self) ->
|
51
|
+
def backend(self) -> _builtins.str:
|
53
52
|
return pulumi.get(self, "backend")
|
54
53
|
|
55
|
-
@property
|
54
|
+
@_builtins.property
|
56
55
|
@pulumi.getter
|
57
|
-
def id(self) ->
|
56
|
+
def id(self) -> _builtins.str:
|
58
57
|
"""
|
59
58
|
The provider-assigned unique ID for this managed resource.
|
60
59
|
"""
|
61
60
|
return pulumi.get(self, "id")
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter(name="keyInfo")
|
65
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, _builtins.str]:
|
66
65
|
"""
|
67
66
|
Map of issuer strings read from Vault.
|
68
67
|
"""
|
69
68
|
return pulumi.get(self, "key_info")
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="keyInfoJson")
|
73
|
-
def key_info_json(self) ->
|
72
|
+
def key_info_json(self) -> _builtins.str:
|
74
73
|
"""
|
75
74
|
JSON-encoded issuer data read from Vault.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "key_info_json")
|
78
77
|
|
79
|
-
@property
|
78
|
+
@_builtins.property
|
80
79
|
@pulumi.getter
|
81
|
-
def keys(self) -> Sequence[
|
80
|
+
def keys(self) -> Sequence[_builtins.str]:
|
82
81
|
"""
|
83
82
|
Keys used by issuers under the backend path.
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "keys")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def namespace(self) -> Optional[
|
88
|
+
def namespace(self) -> Optional[_builtins.str]:
|
90
89
|
return pulumi.get(self, "namespace")
|
91
90
|
|
92
91
|
|
@@ -104,8 +103,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
|
|
104
103
|
namespace=self.namespace)
|
105
104
|
|
106
105
|
|
107
|
-
def get_backend_issuers(backend: Optional[
|
108
|
-
namespace: Optional[
|
106
|
+
def get_backend_issuers(backend: Optional[_builtins.str] = None,
|
107
|
+
namespace: Optional[_builtins.str] = None,
|
109
108
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
|
110
109
|
"""
|
111
110
|
## Example Usage
|
@@ -118,7 +117,7 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
118
117
|
path="pki",
|
119
118
|
type="pki",
|
120
119
|
description="PKI secret engine mount")
|
121
|
-
root = vault.
|
120
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
122
121
|
backend=pki.path,
|
123
122
|
type="internal",
|
124
123
|
common_name="example",
|
@@ -128,9 +127,9 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
128
127
|
```
|
129
128
|
|
130
129
|
|
131
|
-
:param
|
130
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
132
131
|
read the issuers from, with no leading or trailing `/`s.
|
133
|
-
:param
|
132
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
134
133
|
The value should not contain leading or trailing forward slashes.
|
135
134
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
136
135
|
*Available only for Vault Enterprise*.
|
@@ -148,8 +147,8 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
148
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
149
148
|
keys=pulumi.get(__ret__, 'keys'),
|
150
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
151
|
-
def get_backend_issuers_output(backend: Optional[pulumi.Input[
|
152
|
-
namespace: Optional[pulumi.Input[Optional[
|
150
|
+
def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
151
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
153
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
154
153
|
"""
|
155
154
|
## Example Usage
|
@@ -162,7 +161,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
|
|
162
161
|
path="pki",
|
163
162
|
type="pki",
|
164
163
|
description="PKI secret engine mount")
|
165
|
-
root = vault.
|
164
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
166
165
|
backend=pki.path,
|
167
166
|
type="internal",
|
168
167
|
common_name="example",
|
@@ -172,9 +171,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
|
|
172
171
|
```
|
173
172
|
|
174
173
|
|
175
|
-
:param
|
174
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
176
175
|
read the issuers from, with no leading or trailing `/`s.
|
177
|
-
:param
|
176
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
178
177
|
The value should not contain leading or trailing forward slashes.
|
179
178
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
179
|
*Available only for Vault Enterprise*.
|