pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,25 +19,29 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendCaArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
generate_signing_key: Optional[pulumi.Input[
|
25
|
-
key_bits: Optional[pulumi.Input[
|
26
|
-
key_type: Optional[pulumi.Input[
|
27
|
-
|
28
|
-
|
29
|
-
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
25
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None):
|
30
31
|
"""
|
31
32
|
The set of arguments for constructing a SecretBackendCa resource.
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
34
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
35
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
36
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
37
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
38
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
39
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
40
|
The value should not contain leading or trailing forward slashes.
|
38
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
42
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
|
44
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
42
45
|
"""
|
43
46
|
if backend is not None:
|
44
47
|
pulumi.set(__self__, "backend", backend)
|
@@ -48,6 +51,10 @@ class SecretBackendCaArgs:
|
|
48
51
|
pulumi.set(__self__, "key_bits", key_bits)
|
49
52
|
if key_type is not None:
|
50
53
|
pulumi.set(__self__, "key_type", key_type)
|
54
|
+
if managed_key_id is not None:
|
55
|
+
pulumi.set(__self__, "managed_key_id", managed_key_id)
|
56
|
+
if managed_key_name is not None:
|
57
|
+
pulumi.set(__self__, "managed_key_name", managed_key_name)
|
51
58
|
if namespace is not None:
|
52
59
|
pulumi.set(__self__, "namespace", namespace)
|
53
60
|
if private_key is not None:
|
@@ -55,57 +62,81 @@ class SecretBackendCaArgs:
|
|
55
62
|
if public_key is not None:
|
56
63
|
pulumi.set(__self__, "public_key", public_key)
|
57
64
|
|
58
|
-
@property
|
65
|
+
@_builtins.property
|
59
66
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[
|
67
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
61
68
|
"""
|
62
69
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
63
70
|
"""
|
64
71
|
return pulumi.get(self, "backend")
|
65
72
|
|
66
73
|
@backend.setter
|
67
|
-
def backend(self, value: Optional[pulumi.Input[
|
74
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
68
75
|
pulumi.set(self, "backend", value)
|
69
76
|
|
70
|
-
@property
|
77
|
+
@_builtins.property
|
71
78
|
@pulumi.getter(name="generateSigningKey")
|
72
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[
|
79
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
73
80
|
"""
|
74
81
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
75
82
|
"""
|
76
83
|
return pulumi.get(self, "generate_signing_key")
|
77
84
|
|
78
85
|
@generate_signing_key.setter
|
79
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[
|
86
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
80
87
|
pulumi.set(self, "generate_signing_key", value)
|
81
88
|
|
82
|
-
@property
|
89
|
+
@_builtins.property
|
83
90
|
@pulumi.getter(name="keyBits")
|
84
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
91
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
85
92
|
"""
|
86
93
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
87
94
|
"""
|
88
95
|
return pulumi.get(self, "key_bits")
|
89
96
|
|
90
97
|
@key_bits.setter
|
91
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
98
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
92
99
|
pulumi.set(self, "key_bits", value)
|
93
100
|
|
94
|
-
@property
|
101
|
+
@_builtins.property
|
95
102
|
@pulumi.getter(name="keyType")
|
96
|
-
def key_type(self) -> Optional[pulumi.Input[
|
103
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
97
104
|
"""
|
98
105
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
99
106
|
"""
|
100
107
|
return pulumi.get(self, "key_type")
|
101
108
|
|
102
109
|
@key_type.setter
|
103
|
-
def key_type(self, value: Optional[pulumi.Input[
|
110
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
104
111
|
pulumi.set(self, "key_type", value)
|
105
112
|
|
106
|
-
@property
|
113
|
+
@_builtins.property
|
114
|
+
@pulumi.getter(name="managedKeyId")
|
115
|
+
def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
116
|
+
"""
|
117
|
+
The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
118
|
+
"""
|
119
|
+
return pulumi.get(self, "managed_key_id")
|
120
|
+
|
121
|
+
@managed_key_id.setter
|
122
|
+
def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
123
|
+
pulumi.set(self, "managed_key_id", value)
|
124
|
+
|
125
|
+
@_builtins.property
|
126
|
+
@pulumi.getter(name="managedKeyName")
|
127
|
+
def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
128
|
+
"""
|
129
|
+
The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
130
|
+
"""
|
131
|
+
return pulumi.get(self, "managed_key_name")
|
132
|
+
|
133
|
+
@managed_key_name.setter
|
134
|
+
def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
135
|
+
pulumi.set(self, "managed_key_name", value)
|
136
|
+
|
137
|
+
@_builtins.property
|
107
138
|
@pulumi.getter
|
108
|
-
def namespace(self) -> Optional[pulumi.Input[
|
139
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
109
140
|
"""
|
110
141
|
The namespace to provision the resource in.
|
111
142
|
The value should not contain leading or trailing forward slashes.
|
@@ -115,56 +146,60 @@ class SecretBackendCaArgs:
|
|
115
146
|
return pulumi.get(self, "namespace")
|
116
147
|
|
117
148
|
@namespace.setter
|
118
|
-
def namespace(self, value: Optional[pulumi.Input[
|
149
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
119
150
|
pulumi.set(self, "namespace", value)
|
120
151
|
|
121
|
-
@property
|
152
|
+
@_builtins.property
|
122
153
|
@pulumi.getter(name="privateKey")
|
123
|
-
def private_key(self) -> Optional[pulumi.Input[
|
154
|
+
def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
124
155
|
"""
|
125
|
-
|
156
|
+
The private key part the SSH CA key pair; required if generate_signing_key is false.
|
126
157
|
"""
|
127
158
|
return pulumi.get(self, "private_key")
|
128
159
|
|
129
160
|
@private_key.setter
|
130
|
-
def private_key(self, value: Optional[pulumi.Input[
|
161
|
+
def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
131
162
|
pulumi.set(self, "private_key", value)
|
132
163
|
|
133
|
-
@property
|
164
|
+
@_builtins.property
|
134
165
|
@pulumi.getter(name="publicKey")
|
135
|
-
def public_key(self) -> Optional[pulumi.Input[
|
166
|
+
def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
136
167
|
"""
|
137
168
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
138
169
|
"""
|
139
170
|
return pulumi.get(self, "public_key")
|
140
171
|
|
141
172
|
@public_key.setter
|
142
|
-
def public_key(self, value: Optional[pulumi.Input[
|
173
|
+
def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
174
|
pulumi.set(self, "public_key", value)
|
144
175
|
|
145
176
|
|
146
177
|
@pulumi.input_type
|
147
178
|
class _SecretBackendCaState:
|
148
179
|
def __init__(__self__, *,
|
149
|
-
backend: Optional[pulumi.Input[
|
150
|
-
generate_signing_key: Optional[pulumi.Input[
|
151
|
-
key_bits: Optional[pulumi.Input[
|
152
|
-
key_type: Optional[pulumi.Input[
|
153
|
-
|
154
|
-
|
155
|
-
|
180
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
181
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
182
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
183
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
184
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
185
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
186
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
187
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
188
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None):
|
156
189
|
"""
|
157
190
|
Input properties used for looking up and filtering SecretBackendCa resources.
|
158
|
-
:param pulumi.Input[
|
159
|
-
:param pulumi.Input[
|
160
|
-
:param pulumi.Input[
|
161
|
-
:param pulumi.Input[
|
162
|
-
:param pulumi.Input[
|
191
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
192
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
193
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
194
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
195
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
196
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
197
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
163
198
|
The value should not contain leading or trailing forward slashes.
|
164
199
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
165
200
|
*Available only for Vault Enterprise*.
|
166
|
-
:param pulumi.Input[
|
167
|
-
:param pulumi.Input[
|
201
|
+
:param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
|
202
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
168
203
|
"""
|
169
204
|
if backend is not None:
|
170
205
|
pulumi.set(__self__, "backend", backend)
|
@@ -174,6 +209,10 @@ class _SecretBackendCaState:
|
|
174
209
|
pulumi.set(__self__, "key_bits", key_bits)
|
175
210
|
if key_type is not None:
|
176
211
|
pulumi.set(__self__, "key_type", key_type)
|
212
|
+
if managed_key_id is not None:
|
213
|
+
pulumi.set(__self__, "managed_key_id", managed_key_id)
|
214
|
+
if managed_key_name is not None:
|
215
|
+
pulumi.set(__self__, "managed_key_name", managed_key_name)
|
177
216
|
if namespace is not None:
|
178
217
|
pulumi.set(__self__, "namespace", namespace)
|
179
218
|
if private_key is not None:
|
@@ -181,57 +220,81 @@ class _SecretBackendCaState:
|
|
181
220
|
if public_key is not None:
|
182
221
|
pulumi.set(__self__, "public_key", public_key)
|
183
222
|
|
184
|
-
@property
|
223
|
+
@_builtins.property
|
185
224
|
@pulumi.getter
|
186
|
-
def backend(self) -> Optional[pulumi.Input[
|
225
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
187
226
|
"""
|
188
227
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
189
228
|
"""
|
190
229
|
return pulumi.get(self, "backend")
|
191
230
|
|
192
231
|
@backend.setter
|
193
|
-
def backend(self, value: Optional[pulumi.Input[
|
232
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
194
233
|
pulumi.set(self, "backend", value)
|
195
234
|
|
196
|
-
@property
|
235
|
+
@_builtins.property
|
197
236
|
@pulumi.getter(name="generateSigningKey")
|
198
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[
|
237
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
199
238
|
"""
|
200
239
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
201
240
|
"""
|
202
241
|
return pulumi.get(self, "generate_signing_key")
|
203
242
|
|
204
243
|
@generate_signing_key.setter
|
205
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[
|
244
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
206
245
|
pulumi.set(self, "generate_signing_key", value)
|
207
246
|
|
208
|
-
@property
|
247
|
+
@_builtins.property
|
209
248
|
@pulumi.getter(name="keyBits")
|
210
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
249
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
211
250
|
"""
|
212
251
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
213
252
|
"""
|
214
253
|
return pulumi.get(self, "key_bits")
|
215
254
|
|
216
255
|
@key_bits.setter
|
217
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
256
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
218
257
|
pulumi.set(self, "key_bits", value)
|
219
258
|
|
220
|
-
@property
|
259
|
+
@_builtins.property
|
221
260
|
@pulumi.getter(name="keyType")
|
222
|
-
def key_type(self) -> Optional[pulumi.Input[
|
261
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
262
|
"""
|
224
263
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
225
264
|
"""
|
226
265
|
return pulumi.get(self, "key_type")
|
227
266
|
|
228
267
|
@key_type.setter
|
229
|
-
def key_type(self, value: Optional[pulumi.Input[
|
268
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
230
269
|
pulumi.set(self, "key_type", value)
|
231
270
|
|
232
|
-
@property
|
271
|
+
@_builtins.property
|
272
|
+
@pulumi.getter(name="managedKeyId")
|
273
|
+
def managed_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
274
|
+
"""
|
275
|
+
The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
276
|
+
"""
|
277
|
+
return pulumi.get(self, "managed_key_id")
|
278
|
+
|
279
|
+
@managed_key_id.setter
|
280
|
+
def managed_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
281
|
+
pulumi.set(self, "managed_key_id", value)
|
282
|
+
|
283
|
+
@_builtins.property
|
284
|
+
@pulumi.getter(name="managedKeyName")
|
285
|
+
def managed_key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
286
|
+
"""
|
287
|
+
The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
288
|
+
"""
|
289
|
+
return pulumi.get(self, "managed_key_name")
|
290
|
+
|
291
|
+
@managed_key_name.setter
|
292
|
+
def managed_key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
293
|
+
pulumi.set(self, "managed_key_name", value)
|
294
|
+
|
295
|
+
@_builtins.property
|
233
296
|
@pulumi.getter
|
234
|
-
def namespace(self) -> Optional[pulumi.Input[
|
297
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
235
298
|
"""
|
236
299
|
The namespace to provision the resource in.
|
237
300
|
The value should not contain leading or trailing forward slashes.
|
@@ -241,31 +304,31 @@ class _SecretBackendCaState:
|
|
241
304
|
return pulumi.get(self, "namespace")
|
242
305
|
|
243
306
|
@namespace.setter
|
244
|
-
def namespace(self, value: Optional[pulumi.Input[
|
307
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
245
308
|
pulumi.set(self, "namespace", value)
|
246
309
|
|
247
|
-
@property
|
310
|
+
@_builtins.property
|
248
311
|
@pulumi.getter(name="privateKey")
|
249
|
-
def private_key(self) -> Optional[pulumi.Input[
|
312
|
+
def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
313
|
"""
|
251
|
-
|
314
|
+
The private key part the SSH CA key pair; required if generate_signing_key is false.
|
252
315
|
"""
|
253
316
|
return pulumi.get(self, "private_key")
|
254
317
|
|
255
318
|
@private_key.setter
|
256
|
-
def private_key(self, value: Optional[pulumi.Input[
|
319
|
+
def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
320
|
pulumi.set(self, "private_key", value)
|
258
321
|
|
259
|
-
@property
|
322
|
+
@_builtins.property
|
260
323
|
@pulumi.getter(name="publicKey")
|
261
|
-
def public_key(self) -> Optional[pulumi.Input[
|
324
|
+
def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
262
325
|
"""
|
263
326
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
264
327
|
"""
|
265
328
|
return pulumi.get(self, "public_key")
|
266
329
|
|
267
330
|
@public_key.setter
|
268
|
-
def public_key(self, value: Optional[pulumi.Input[
|
331
|
+
def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
269
332
|
pulumi.set(self, "public_key", value)
|
270
333
|
|
271
334
|
|
@@ -275,13 +338,15 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
275
338
|
def __init__(__self__,
|
276
339
|
resource_name: str,
|
277
340
|
opts: Optional[pulumi.ResourceOptions] = None,
|
278
|
-
backend: Optional[pulumi.Input[
|
279
|
-
generate_signing_key: Optional[pulumi.Input[
|
280
|
-
key_bits: Optional[pulumi.Input[
|
281
|
-
key_type: Optional[pulumi.Input[
|
282
|
-
|
283
|
-
|
284
|
-
|
341
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
343
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
344
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
346
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
347
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
348
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
349
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
285
350
|
__props__=None):
|
286
351
|
"""
|
287
352
|
Provides a resource to manage CA information in an SSH secret backend
|
@@ -307,16 +372,18 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
307
372
|
|
308
373
|
:param str resource_name: The name of the resource.
|
309
374
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
310
|
-
:param pulumi.Input[
|
311
|
-
:param pulumi.Input[
|
312
|
-
:param pulumi.Input[
|
313
|
-
:param pulumi.Input[
|
314
|
-
:param pulumi.Input[
|
375
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
376
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
377
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
378
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
379
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
380
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
381
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
315
382
|
The value should not contain leading or trailing forward slashes.
|
316
383
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
317
384
|
*Available only for Vault Enterprise*.
|
318
|
-
:param pulumi.Input[
|
319
|
-
:param pulumi.Input[
|
385
|
+
:param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
|
386
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
320
387
|
"""
|
321
388
|
...
|
322
389
|
@overload
|
@@ -361,13 +428,15 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
361
428
|
def _internal_init(__self__,
|
362
429
|
resource_name: str,
|
363
430
|
opts: Optional[pulumi.ResourceOptions] = None,
|
364
|
-
backend: Optional[pulumi.Input[
|
365
|
-
generate_signing_key: Optional[pulumi.Input[
|
366
|
-
key_bits: Optional[pulumi.Input[
|
367
|
-
key_type: Optional[pulumi.Input[
|
368
|
-
|
369
|
-
|
370
|
-
|
431
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
432
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
433
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
434
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
435
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
436
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
437
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
438
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
439
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
371
440
|
__props__=None):
|
372
441
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
373
442
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -381,6 +450,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
381
450
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
382
451
|
__props__.__dict__["key_bits"] = key_bits
|
383
452
|
__props__.__dict__["key_type"] = key_type
|
453
|
+
__props__.__dict__["managed_key_id"] = managed_key_id
|
454
|
+
__props__.__dict__["managed_key_name"] = managed_key_name
|
384
455
|
__props__.__dict__["namespace"] = namespace
|
385
456
|
__props__.__dict__["private_key"] = None if private_key is None else pulumi.Output.secret(private_key)
|
386
457
|
__props__.__dict__["public_key"] = public_key
|
@@ -396,13 +467,15 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
396
467
|
def get(resource_name: str,
|
397
468
|
id: pulumi.Input[str],
|
398
469
|
opts: Optional[pulumi.ResourceOptions] = None,
|
399
|
-
backend: Optional[pulumi.Input[
|
400
|
-
generate_signing_key: Optional[pulumi.Input[
|
401
|
-
key_bits: Optional[pulumi.Input[
|
402
|
-
key_type: Optional[pulumi.Input[
|
403
|
-
|
404
|
-
|
405
|
-
|
470
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
471
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
472
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
473
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
474
|
+
managed_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
475
|
+
managed_key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
476
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
477
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
478
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendCa':
|
406
479
|
"""
|
407
480
|
Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
|
408
481
|
properties used to qualify the lookup.
|
@@ -410,16 +483,18 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
410
483
|
:param str resource_name: The unique name of the resulting resource.
|
411
484
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
412
485
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
413
|
-
:param pulumi.Input[
|
414
|
-
:param pulumi.Input[
|
415
|
-
:param pulumi.Input[
|
416
|
-
:param pulumi.Input[
|
417
|
-
:param pulumi.Input[
|
486
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
487
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
488
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
489
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
490
|
+
:param pulumi.Input[_builtins.str] managed_key_id: The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
491
|
+
:param pulumi.Input[_builtins.str] managed_key_name: The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
492
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
418
493
|
The value should not contain leading or trailing forward slashes.
|
419
494
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
420
495
|
*Available only for Vault Enterprise*.
|
421
|
-
:param pulumi.Input[
|
422
|
-
:param pulumi.Input[
|
496
|
+
:param pulumi.Input[_builtins.str] private_key: The private key part the SSH CA key pair; required if generate_signing_key is false.
|
497
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
423
498
|
"""
|
424
499
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
425
500
|
|
@@ -429,46 +504,64 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
429
504
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
430
505
|
__props__.__dict__["key_bits"] = key_bits
|
431
506
|
__props__.__dict__["key_type"] = key_type
|
507
|
+
__props__.__dict__["managed_key_id"] = managed_key_id
|
508
|
+
__props__.__dict__["managed_key_name"] = managed_key_name
|
432
509
|
__props__.__dict__["namespace"] = namespace
|
433
510
|
__props__.__dict__["private_key"] = private_key
|
434
511
|
__props__.__dict__["public_key"] = public_key
|
435
512
|
return SecretBackendCa(resource_name, opts=opts, __props__=__props__)
|
436
513
|
|
437
|
-
@property
|
514
|
+
@_builtins.property
|
438
515
|
@pulumi.getter
|
439
|
-
def backend(self) -> pulumi.Output[Optional[
|
516
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
440
517
|
"""
|
441
518
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
442
519
|
"""
|
443
520
|
return pulumi.get(self, "backend")
|
444
521
|
|
445
|
-
@property
|
522
|
+
@_builtins.property
|
446
523
|
@pulumi.getter(name="generateSigningKey")
|
447
|
-
def generate_signing_key(self) -> pulumi.Output[Optional[
|
524
|
+
def generate_signing_key(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
448
525
|
"""
|
449
526
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
450
527
|
"""
|
451
528
|
return pulumi.get(self, "generate_signing_key")
|
452
529
|
|
453
|
-
@property
|
530
|
+
@_builtins.property
|
454
531
|
@pulumi.getter(name="keyBits")
|
455
|
-
def key_bits(self) -> pulumi.Output[Optional[
|
532
|
+
def key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
|
456
533
|
"""
|
457
534
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
458
535
|
"""
|
459
536
|
return pulumi.get(self, "key_bits")
|
460
537
|
|
461
|
-
@property
|
538
|
+
@_builtins.property
|
462
539
|
@pulumi.getter(name="keyType")
|
463
|
-
def key_type(self) -> pulumi.Output[Optional[
|
540
|
+
def key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
464
541
|
"""
|
465
542
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
466
543
|
"""
|
467
544
|
return pulumi.get(self, "key_type")
|
468
545
|
|
469
|
-
@property
|
546
|
+
@_builtins.property
|
547
|
+
@pulumi.getter(name="managedKeyId")
|
548
|
+
def managed_key_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
549
|
+
"""
|
550
|
+
The id of the managed key to use. When using a managed key, this field or managed_key_name is required.
|
551
|
+
"""
|
552
|
+
return pulumi.get(self, "managed_key_id")
|
553
|
+
|
554
|
+
@_builtins.property
|
555
|
+
@pulumi.getter(name="managedKeyName")
|
556
|
+
def managed_key_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
557
|
+
"""
|
558
|
+
The name of the managed key to use. When using a managed key, this field or managed_key_id is required.
|
559
|
+
"""
|
560
|
+
return pulumi.get(self, "managed_key_name")
|
561
|
+
|
562
|
+
@_builtins.property
|
470
563
|
@pulumi.getter
|
471
|
-
def namespace(self) -> pulumi.Output[Optional[
|
564
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
472
565
|
"""
|
473
566
|
The namespace to provision the resource in.
|
474
567
|
The value should not contain leading or trailing forward slashes.
|
@@ -477,17 +570,17 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
477
570
|
"""
|
478
571
|
return pulumi.get(self, "namespace")
|
479
572
|
|
480
|
-
@property
|
573
|
+
@_builtins.property
|
481
574
|
@pulumi.getter(name="privateKey")
|
482
|
-
def private_key(self) -> pulumi.Output[
|
575
|
+
def private_key(self) -> pulumi.Output[_builtins.str]:
|
483
576
|
"""
|
484
|
-
|
577
|
+
The private key part the SSH CA key pair; required if generate_signing_key is false.
|
485
578
|
"""
|
486
579
|
return pulumi.get(self, "private_key")
|
487
580
|
|
488
|
-
@property
|
581
|
+
@_builtins.property
|
489
582
|
@pulumi.getter(name="publicKey")
|
490
|
-
def public_key(self) -> pulumi.Output[
|
583
|
+
def public_key(self) -> pulumi.Output[_builtins.str]:
|
491
584
|
"""
|
492
585
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
493
586
|
"""
|