pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/ssh/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -24,11 +23,11 @@ MYPY = False
|
|
24
23
|
|
25
24
|
if not MYPY:
|
26
25
|
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
27
|
-
lengths: pulumi.Input[Sequence[pulumi.Input[
|
26
|
+
lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]
|
28
27
|
"""
|
29
28
|
List of allowed key lengths, vault-1.10 and above
|
30
29
|
"""
|
31
|
-
type: pulumi.Input[
|
30
|
+
type: pulumi.Input[_builtins.str]
|
32
31
|
"""
|
33
32
|
Key type, choices:
|
34
33
|
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
@@ -39,31 +38,31 @@ elif False:
|
|
39
38
|
@pulumi.input_type
|
40
39
|
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
41
40
|
def __init__(__self__, *,
|
42
|
-
lengths: pulumi.Input[Sequence[pulumi.Input[
|
43
|
-
type: pulumi.Input[
|
41
|
+
lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]],
|
42
|
+
type: pulumi.Input[_builtins.str]):
|
44
43
|
"""
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
46
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.int]]] lengths: List of allowed key lengths, vault-1.10 and above
|
45
|
+
:param pulumi.Input[_builtins.str] type: Key type, choices:
|
47
46
|
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "lengths", lengths)
|
50
49
|
pulumi.set(__self__, "type", type)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter
|
54
|
-
def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[
|
53
|
+
def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]:
|
55
54
|
"""
|
56
55
|
List of allowed key lengths, vault-1.10 and above
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "lengths")
|
59
58
|
|
60
59
|
@lengths.setter
|
61
|
-
def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[
|
60
|
+
def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]):
|
62
61
|
pulumi.set(self, "lengths", value)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def type(self) -> pulumi.Input[
|
65
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
67
66
|
"""
|
68
67
|
Key type, choices:
|
69
68
|
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
@@ -71,7 +70,7 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
71
70
|
return pulumi.get(self, "type")
|
72
71
|
|
73
72
|
@type.setter
|
74
|
-
def type(self, value: pulumi.Input[
|
73
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
75
74
|
pulumi.set(self, "type", value)
|
76
75
|
|
77
76
|
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -68,78 +67,78 @@ class GetSecretBackendSignResult:
|
|
68
67
|
raise TypeError("Expected argument 'valid_principals' to be a str")
|
69
68
|
pulumi.set(__self__, "valid_principals", valid_principals)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="certType")
|
73
|
-
def cert_type(self) -> Optional[
|
72
|
+
def cert_type(self) -> Optional[_builtins.str]:
|
74
73
|
return pulumi.get(self, "cert_type")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter(name="criticalOptions")
|
78
|
-
def critical_options(self) -> Optional[Mapping[str,
|
77
|
+
def critical_options(self) -> Optional[Mapping[str, _builtins.str]]:
|
79
78
|
return pulumi.get(self, "critical_options")
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter
|
83
|
-
def extensions(self) -> Optional[Mapping[str,
|
82
|
+
def extensions(self) -> Optional[Mapping[str, _builtins.str]]:
|
84
83
|
return pulumi.get(self, "extensions")
|
85
84
|
|
86
|
-
@property
|
85
|
+
@_builtins.property
|
87
86
|
@pulumi.getter
|
88
|
-
def id(self) ->
|
87
|
+
def id(self) -> _builtins.str:
|
89
88
|
"""
|
90
89
|
The provider-assigned unique ID for this managed resource.
|
91
90
|
"""
|
92
91
|
return pulumi.get(self, "id")
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter(name="keyId")
|
96
|
-
def key_id(self) -> Optional[
|
95
|
+
def key_id(self) -> Optional[_builtins.str]:
|
97
96
|
return pulumi.get(self, "key_id")
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter
|
101
|
-
def name(self) ->
|
100
|
+
def name(self) -> _builtins.str:
|
102
101
|
return pulumi.get(self, "name")
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def namespace(self) -> Optional[
|
105
|
+
def namespace(self) -> Optional[_builtins.str]:
|
107
106
|
return pulumi.get(self, "namespace")
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def path(self) ->
|
110
|
+
def path(self) -> _builtins.str:
|
112
111
|
return pulumi.get(self, "path")
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="publicKey")
|
116
|
-
def public_key(self) ->
|
115
|
+
def public_key(self) -> _builtins.str:
|
117
116
|
return pulumi.get(self, "public_key")
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter(name="serialNumber")
|
121
|
-
def serial_number(self) ->
|
120
|
+
def serial_number(self) -> _builtins.str:
|
122
121
|
"""
|
123
122
|
The serial number of the certificate returned from Vault
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "serial_number")
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter(name="signedKey")
|
129
|
-
def signed_key(self) ->
|
128
|
+
def signed_key(self) -> _builtins.str:
|
130
129
|
"""
|
131
130
|
The signed certificate returned from Vault
|
132
131
|
"""
|
133
132
|
return pulumi.get(self, "signed_key")
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter
|
137
|
-
def ttl(self) -> Optional[
|
136
|
+
def ttl(self) -> Optional[_builtins.str]:
|
138
137
|
return pulumi.get(self, "ttl")
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="validPrincipals")
|
142
|
-
def valid_principals(self) -> Optional[
|
141
|
+
def valid_principals(self) -> Optional[_builtins.str]:
|
143
142
|
return pulumi.get(self, "valid_principals")
|
144
143
|
|
145
144
|
|
@@ -164,16 +163,16 @@ class AwaitableGetSecretBackendSignResult(GetSecretBackendSignResult):
|
|
164
163
|
valid_principals=self.valid_principals)
|
165
164
|
|
166
165
|
|
167
|
-
def get_secret_backend_sign(cert_type: Optional[
|
168
|
-
critical_options: Optional[Mapping[str,
|
169
|
-
extensions: Optional[Mapping[str,
|
170
|
-
key_id: Optional[
|
171
|
-
name: Optional[
|
172
|
-
namespace: Optional[
|
173
|
-
path: Optional[
|
174
|
-
public_key: Optional[
|
175
|
-
ttl: Optional[
|
176
|
-
valid_principals: Optional[
|
166
|
+
def get_secret_backend_sign(cert_type: Optional[_builtins.str] = None,
|
167
|
+
critical_options: Optional[Mapping[str, _builtins.str]] = None,
|
168
|
+
extensions: Optional[Mapping[str, _builtins.str]] = None,
|
169
|
+
key_id: Optional[_builtins.str] = None,
|
170
|
+
name: Optional[_builtins.str] = None,
|
171
|
+
namespace: Optional[_builtins.str] = None,
|
172
|
+
path: Optional[_builtins.str] = None,
|
173
|
+
public_key: Optional[_builtins.str] = None,
|
174
|
+
ttl: Optional[_builtins.str] = None,
|
175
|
+
valid_principals: Optional[_builtins.str] = None,
|
177
176
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretBackendSignResult:
|
178
177
|
"""
|
179
178
|
This is a data source which can be used to sign an SSH public key
|
@@ -191,15 +190,15 @@ def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
|
|
191
190
|
```
|
192
191
|
|
193
192
|
|
194
|
-
:param
|
195
|
-
:param Mapping[str,
|
196
|
-
:param Mapping[str,
|
197
|
-
:param
|
198
|
-
:param
|
199
|
-
:param
|
200
|
-
:param
|
201
|
-
:param
|
202
|
-
:param
|
193
|
+
:param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
|
194
|
+
:param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
|
195
|
+
:param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
|
196
|
+
:param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
|
197
|
+
:param _builtins.str name: Specifies the name of the role to sign.
|
198
|
+
:param _builtins.str path: Full path where SSH backend is mounted.
|
199
|
+
:param _builtins.str public_key: Specifies the SSH public key that should be signed.
|
200
|
+
:param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
|
201
|
+
:param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
|
203
202
|
"""
|
204
203
|
__args__ = dict()
|
205
204
|
__args__['certType'] = cert_type
|
@@ -229,16 +228,16 @@ def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
|
|
229
228
|
signed_key=pulumi.get(__ret__, 'signed_key'),
|
230
229
|
ttl=pulumi.get(__ret__, 'ttl'),
|
231
230
|
valid_principals=pulumi.get(__ret__, 'valid_principals'))
|
232
|
-
def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[
|
233
|
-
critical_options: Optional[pulumi.Input[Optional[Mapping[str,
|
234
|
-
extensions: Optional[pulumi.Input[Optional[Mapping[str,
|
235
|
-
key_id: Optional[pulumi.Input[Optional[
|
236
|
-
name: Optional[pulumi.Input[
|
237
|
-
namespace: Optional[pulumi.Input[Optional[
|
238
|
-
path: Optional[pulumi.Input[
|
239
|
-
public_key: Optional[pulumi.Input[
|
240
|
-
ttl: Optional[pulumi.Input[Optional[
|
241
|
-
valid_principals: Optional[pulumi.Input[Optional[
|
231
|
+
def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
232
|
+
critical_options: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
233
|
+
extensions: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
234
|
+
key_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
235
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
236
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
237
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
238
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
239
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
240
|
+
valid_principals: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
242
241
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretBackendSignResult]:
|
243
242
|
"""
|
244
243
|
This is a data source which can be used to sign an SSH public key
|
@@ -256,15 +255,15 @@ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[bui
|
|
256
255
|
```
|
257
256
|
|
258
257
|
|
259
|
-
:param
|
260
|
-
:param Mapping[str,
|
261
|
-
:param Mapping[str,
|
262
|
-
:param
|
263
|
-
:param
|
264
|
-
:param
|
265
|
-
:param
|
266
|
-
:param
|
267
|
-
:param
|
258
|
+
:param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
|
259
|
+
:param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
|
260
|
+
:param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
|
261
|
+
:param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
|
262
|
+
:param _builtins.str name: Specifies the name of the role to sign.
|
263
|
+
:param _builtins.str path: Full path where SSH backend is mounted.
|
264
|
+
:param _builtins.str public_key: Specifies the SSH public key that should be signed.
|
265
|
+
:param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
|
266
|
+
:param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
|
268
267
|
"""
|
269
268
|
__args__ = dict()
|
270
269
|
__args__['certType'] = cert_type
|
pulumi_vault/ssh/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,27 +21,27 @@ __all__ = [
|
|
22
21
|
@pulumi.output_type
|
23
22
|
class SecretBackendRoleAllowedUserKeyConfig(dict):
|
24
23
|
def __init__(__self__, *,
|
25
|
-
lengths: Sequence[
|
26
|
-
type:
|
24
|
+
lengths: Sequence[_builtins.int],
|
25
|
+
type: _builtins.str):
|
27
26
|
"""
|
28
|
-
:param Sequence[
|
29
|
-
:param
|
27
|
+
:param Sequence[_builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
|
28
|
+
:param _builtins.str type: Key type, choices:
|
30
29
|
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
31
30
|
"""
|
32
31
|
pulumi.set(__self__, "lengths", lengths)
|
33
32
|
pulumi.set(__self__, "type", type)
|
34
33
|
|
35
|
-
@property
|
34
|
+
@_builtins.property
|
36
35
|
@pulumi.getter
|
37
|
-
def lengths(self) -> Sequence[
|
36
|
+
def lengths(self) -> Sequence[_builtins.int]:
|
38
37
|
"""
|
39
38
|
List of allowed key lengths, vault-1.10 and above
|
40
39
|
"""
|
41
40
|
return pulumi.get(self, "lengths")
|
42
41
|
|
43
|
-
@property
|
42
|
+
@_builtins.property
|
44
43
|
@pulumi.getter
|
45
|
-
def type(self) ->
|
44
|
+
def type(self) -> _builtins.str:
|
46
45
|
"""
|
47
46
|
Key type, choices:
|
48
47
|
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|