pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -50,51 +49,51 @@ class GetBackendKeyResult:
|
|
50
49
|
raise TypeError("Expected argument 'namespace' to be a str")
|
51
50
|
pulumi.set(__self__, "namespace", namespace)
|
52
51
|
|
53
|
-
@property
|
52
|
+
@_builtins.property
|
54
53
|
@pulumi.getter
|
55
|
-
def backend(self) ->
|
54
|
+
def backend(self) -> _builtins.str:
|
56
55
|
return pulumi.get(self, "backend")
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def id(self) ->
|
59
|
+
def id(self) -> _builtins.str:
|
61
60
|
"""
|
62
61
|
The provider-assigned unique ID for this managed resource.
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "id")
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter(name="keyId")
|
68
|
-
def key_id(self) ->
|
67
|
+
def key_id(self) -> _builtins.str:
|
69
68
|
"""
|
70
69
|
ID of the key.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "key_id")
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter(name="keyName")
|
76
|
-
def key_name(self) ->
|
75
|
+
def key_name(self) -> _builtins.str:
|
77
76
|
"""
|
78
77
|
Name of the key.
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "key_name")
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter(name="keyRef")
|
84
|
-
def key_ref(self) ->
|
83
|
+
def key_ref(self) -> _builtins.str:
|
85
84
|
return pulumi.get(self, "key_ref")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter(name="keyType")
|
89
|
-
def key_type(self) ->
|
88
|
+
def key_type(self) -> _builtins.str:
|
90
89
|
"""
|
91
90
|
Type of the key.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "key_type")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[
|
96
|
+
def namespace(self) -> Optional[_builtins.str]:
|
98
97
|
return pulumi.get(self, "namespace")
|
99
98
|
|
100
99
|
|
@@ -113,9 +112,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
|
|
113
112
|
namespace=self.namespace)
|
114
113
|
|
115
114
|
|
116
|
-
def get_backend_key(backend: Optional[
|
117
|
-
key_ref: Optional[
|
118
|
-
namespace: Optional[
|
115
|
+
def get_backend_key(backend: Optional[_builtins.str] = None,
|
116
|
+
key_ref: Optional[_builtins.str] = None,
|
117
|
+
namespace: Optional[_builtins.str] = None,
|
119
118
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
|
120
119
|
"""
|
121
120
|
## Example Usage
|
@@ -128,7 +127,7 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
128
127
|
path="pki",
|
129
128
|
type="pki",
|
130
129
|
description="PKI secret engine mount")
|
131
|
-
key = vault.
|
130
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
132
131
|
backend=pki.path,
|
133
132
|
type="internal",
|
134
133
|
key_name="example",
|
@@ -139,10 +138,10 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
139
138
|
```
|
140
139
|
|
141
140
|
|
142
|
-
:param
|
141
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
143
142
|
read the key from, with no leading or trailing `/`s.
|
144
|
-
:param
|
145
|
-
:param
|
143
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
144
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
146
145
|
The value should not contain leading or trailing forward slashes.
|
147
146
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
147
|
*Available only for Vault Enterprise*.
|
@@ -162,9 +161,9 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
162
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
163
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
164
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
165
|
-
def get_backend_key_output(backend: Optional[pulumi.Input[
|
166
|
-
key_ref: Optional[pulumi.Input[
|
167
|
-
namespace: Optional[pulumi.Input[Optional[
|
164
|
+
def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
165
|
+
key_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
166
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
168
167
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
169
168
|
"""
|
170
169
|
## Example Usage
|
@@ -177,7 +176,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
|
177
176
|
path="pki",
|
178
177
|
type="pki",
|
179
178
|
description="PKI secret engine mount")
|
180
|
-
key = vault.
|
179
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
181
180
|
backend=pki.path,
|
182
181
|
type="internal",
|
183
182
|
key_name="example",
|
@@ -188,10 +187,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
|
188
187
|
```
|
189
188
|
|
190
189
|
|
191
|
-
:param
|
190
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
192
191
|
read the key from, with no leading or trailing `/`s.
|
193
|
-
:param
|
194
|
-
:param
|
192
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
193
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
195
194
|
The value should not contain leading or trailing forward slashes.
|
196
195
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
197
196
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -47,46 +46,46 @@ class GetBackendKeysResult:
|
|
47
46
|
raise TypeError("Expected argument 'namespace' to be a str")
|
48
47
|
pulumi.set(__self__, "namespace", namespace)
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
@pulumi.getter
|
52
|
-
def backend(self) ->
|
51
|
+
def backend(self) -> _builtins.str:
|
53
52
|
return pulumi.get(self, "backend")
|
54
53
|
|
55
|
-
@property
|
54
|
+
@_builtins.property
|
56
55
|
@pulumi.getter
|
57
|
-
def id(self) ->
|
56
|
+
def id(self) -> _builtins.str:
|
58
57
|
"""
|
59
58
|
The provider-assigned unique ID for this managed resource.
|
60
59
|
"""
|
61
60
|
return pulumi.get(self, "id")
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter(name="keyInfo")
|
65
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, _builtins.str]:
|
66
65
|
"""
|
67
66
|
Map of key strings read from Vault.
|
68
67
|
"""
|
69
68
|
return pulumi.get(self, "key_info")
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="keyInfoJson")
|
73
|
-
def key_info_json(self) ->
|
72
|
+
def key_info_json(self) -> _builtins.str:
|
74
73
|
"""
|
75
74
|
JSON-encoded key data read from Vault.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "key_info_json")
|
78
77
|
|
79
|
-
@property
|
78
|
+
@_builtins.property
|
80
79
|
@pulumi.getter
|
81
|
-
def keys(self) -> Sequence[
|
80
|
+
def keys(self) -> Sequence[_builtins.str]:
|
82
81
|
"""
|
83
82
|
Keys used under the backend path.
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "keys")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def namespace(self) -> Optional[
|
88
|
+
def namespace(self) -> Optional[_builtins.str]:
|
90
89
|
return pulumi.get(self, "namespace")
|
91
90
|
|
92
91
|
|
@@ -104,8 +103,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
|
|
104
103
|
namespace=self.namespace)
|
105
104
|
|
106
105
|
|
107
|
-
def get_backend_keys(backend: Optional[
|
108
|
-
namespace: Optional[
|
106
|
+
def get_backend_keys(backend: Optional[_builtins.str] = None,
|
107
|
+
namespace: Optional[_builtins.str] = None,
|
109
108
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
|
110
109
|
"""
|
111
110
|
## Example Usage
|
@@ -118,7 +117,7 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
|
|
118
117
|
path="pki",
|
119
118
|
type="pki",
|
120
119
|
description="PKI secret engine mount")
|
121
|
-
root = vault.
|
120
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
122
121
|
backend=pki.path,
|
123
122
|
type="internal",
|
124
123
|
common_name="example",
|
@@ -128,9 +127,9 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
|
|
128
127
|
```
|
129
128
|
|
130
129
|
|
131
|
-
:param
|
130
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
132
131
|
read the keys from, with no leading or trailing `/`s.
|
133
|
-
:param
|
132
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
134
133
|
The value should not contain leading or trailing forward slashes.
|
135
134
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
136
135
|
*Available only for Vault Enterprise*.
|
@@ -148,8 +147,8 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
|
|
148
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
149
148
|
keys=pulumi.get(__ret__, 'keys'),
|
150
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
151
|
-
def get_backend_keys_output(backend: Optional[pulumi.Input[
|
152
|
-
namespace: Optional[pulumi.Input[Optional[
|
150
|
+
def get_backend_keys_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
151
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
153
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
154
153
|
"""
|
155
154
|
## Example Usage
|
@@ -162,7 +161,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
|
|
162
161
|
path="pki",
|
163
162
|
type="pki",
|
164
163
|
description="PKI secret engine mount")
|
165
|
-
root = vault.
|
164
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
166
165
|
backend=pki.path,
|
167
166
|
type="internal",
|
168
167
|
common_name="example",
|
@@ -172,9 +171,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
|
|
172
171
|
```
|
173
172
|
|
174
173
|
|
175
|
-
:param
|
174
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
176
175
|
read the keys from, with no leading or trailing `/`s.
|
177
|
-
:param
|
176
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
178
177
|
The value should not contain leading or trailing forward slashes.
|
179
178
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
179
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -30,16 +29,16 @@ __all__ = [
|
|
30
29
|
@pulumi.output_type
|
31
30
|
class BackendConfigCmpv2Authenticators(dict):
|
32
31
|
def __init__(__self__, *,
|
33
|
-
cert: Optional[Mapping[str,
|
32
|
+
cert: Optional[Mapping[str, _builtins.str]] = None):
|
34
33
|
"""
|
35
|
-
:param Mapping[str,
|
34
|
+
:param Mapping[str, _builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
36
35
|
"""
|
37
36
|
if cert is not None:
|
38
37
|
pulumi.set(__self__, "cert", cert)
|
39
38
|
|
40
|
-
@property
|
39
|
+
@_builtins.property
|
41
40
|
@pulumi.getter
|
42
|
-
def cert(self) -> Optional[Mapping[str,
|
41
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
43
42
|
"""
|
44
43
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
45
44
|
"""
|
@@ -49,28 +48,28 @@ class BackendConfigCmpv2Authenticators(dict):
|
|
49
48
|
@pulumi.output_type
|
50
49
|
class BackendConfigEstAuthenticators(dict):
|
51
50
|
def __init__(__self__, *,
|
52
|
-
cert: Optional[Mapping[str,
|
53
|
-
userpass: Optional[Mapping[str,
|
51
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
52
|
+
userpass: Optional[Mapping[str, _builtins.str]] = None):
|
54
53
|
"""
|
55
|
-
:param Mapping[str,
|
56
|
-
:param Mapping[str,
|
54
|
+
:param Mapping[str, _builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
55
|
+
:param Mapping[str, _builtins.str] userpass: The accessor (required) property for user pass auth backends.
|
57
56
|
"""
|
58
57
|
if cert is not None:
|
59
58
|
pulumi.set(__self__, "cert", cert)
|
60
59
|
if userpass is not None:
|
61
60
|
pulumi.set(__self__, "userpass", userpass)
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter
|
65
|
-
def cert(self) -> Optional[Mapping[str,
|
64
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
66
65
|
"""
|
67
66
|
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
68
67
|
"""
|
69
68
|
return pulumi.get(self, "cert")
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def userpass(self) -> Optional[Mapping[str,
|
72
|
+
def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
|
74
73
|
"""
|
75
74
|
The accessor (required) property for user pass auth backends.
|
76
75
|
"""
|
@@ -80,28 +79,28 @@ class BackendConfigEstAuthenticators(dict):
|
|
80
79
|
@pulumi.output_type
|
81
80
|
class BackendConfigScepAuthenticators(dict):
|
82
81
|
def __init__(__self__, *,
|
83
|
-
cert: Optional[Mapping[str,
|
84
|
-
scep: Optional[Mapping[str,
|
82
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
83
|
+
scep: Optional[Mapping[str, _builtins.str]] = None):
|
85
84
|
"""
|
86
|
-
:param Mapping[str,
|
87
|
-
:param Mapping[str,
|
85
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
86
|
+
:param Mapping[str, _builtins.str] scep: The accessor property for SCEP auth backends
|
88
87
|
"""
|
89
88
|
if cert is not None:
|
90
89
|
pulumi.set(__self__, "cert", cert)
|
91
90
|
if scep is not None:
|
92
91
|
pulumi.set(__self__, "scep", scep)
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter
|
96
|
-
def cert(self) -> Optional[Mapping[str,
|
95
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
97
96
|
"""
|
98
97
|
The accessor and cert_role properties for cert auth backends
|
99
98
|
"""
|
100
99
|
return pulumi.get(self, "cert")
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter
|
104
|
-
def scep(self) -> Optional[Mapping[str,
|
103
|
+
def scep(self) -> Optional[Mapping[str, _builtins.str]]:
|
105
104
|
"""
|
106
105
|
The accessor property for SCEP auth backends
|
107
106
|
"""
|
@@ -111,16 +110,16 @@ class BackendConfigScepAuthenticators(dict):
|
|
111
110
|
@pulumi.output_type
|
112
111
|
class BackendConfigScepExternalValidation(dict):
|
113
112
|
def __init__(__self__, *,
|
114
|
-
intune: Optional[Mapping[str,
|
113
|
+
intune: Optional[Mapping[str, _builtins.str]] = None):
|
115
114
|
"""
|
116
|
-
:param Mapping[str,
|
115
|
+
:param Mapping[str, _builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
117
116
|
"""
|
118
117
|
if intune is not None:
|
119
118
|
pulumi.set(__self__, "intune", intune)
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter
|
123
|
-
def intune(self) -> Optional[Mapping[str,
|
122
|
+
def intune(self) -> Optional[Mapping[str, _builtins.str]]:
|
124
123
|
"""
|
125
124
|
The credentials to enable Microsoft Intune validation of SCEP requests
|
126
125
|
"""
|
@@ -130,13 +129,13 @@ class BackendConfigScepExternalValidation(dict):
|
|
130
129
|
@pulumi.output_type
|
131
130
|
class SecretBackendRolePolicyIdentifier(dict):
|
132
131
|
def __init__(__self__, *,
|
133
|
-
oid:
|
134
|
-
cps: Optional[
|
135
|
-
notice: Optional[
|
132
|
+
oid: _builtins.str,
|
133
|
+
cps: Optional[_builtins.str] = None,
|
134
|
+
notice: Optional[_builtins.str] = None):
|
136
135
|
"""
|
137
|
-
:param
|
138
|
-
:param
|
139
|
-
:param
|
136
|
+
:param _builtins.str oid: The OID for the policy identifier
|
137
|
+
:param _builtins.str cps: The URL of the CPS for the policy identifier
|
138
|
+
:param _builtins.str notice: A notice for the policy identifier
|
140
139
|
"""
|
141
140
|
pulumi.set(__self__, "oid", oid)
|
142
141
|
if cps is not None:
|
@@ -144,25 +143,25 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
144
143
|
if notice is not None:
|
145
144
|
pulumi.set(__self__, "notice", notice)
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter
|
149
|
-
def oid(self) ->
|
148
|
+
def oid(self) -> _builtins.str:
|
150
149
|
"""
|
151
150
|
The OID for the policy identifier
|
152
151
|
"""
|
153
152
|
return pulumi.get(self, "oid")
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
@pulumi.getter
|
157
|
-
def cps(self) -> Optional[
|
156
|
+
def cps(self) -> Optional[_builtins.str]:
|
158
157
|
"""
|
159
158
|
The URL of the CPS for the policy identifier
|
160
159
|
"""
|
161
160
|
return pulumi.get(self, "cps")
|
162
161
|
|
163
|
-
@property
|
162
|
+
@_builtins.property
|
164
163
|
@pulumi.getter
|
165
|
-
def notice(self) -> Optional[
|
164
|
+
def notice(self) -> Optional[_builtins.str]:
|
166
165
|
"""
|
167
166
|
A notice for the policy identifier
|
168
167
|
"""
|
@@ -172,16 +171,16 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
172
171
|
@pulumi.output_type
|
173
172
|
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
174
173
|
def __init__(__self__, *,
|
175
|
-
cert: Optional[Mapping[str,
|
174
|
+
cert: Optional[Mapping[str, _builtins.str]] = None):
|
176
175
|
"""
|
177
|
-
:param Mapping[str,
|
176
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
178
177
|
"""
|
179
178
|
if cert is not None:
|
180
179
|
pulumi.set(__self__, "cert", cert)
|
181
180
|
|
182
|
-
@property
|
181
|
+
@_builtins.property
|
183
182
|
@pulumi.getter
|
184
|
-
def cert(self) -> Optional[Mapping[str,
|
183
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
185
184
|
"""
|
186
185
|
The accessor and cert_role properties for cert auth backends
|
187
186
|
"""
|
@@ -191,28 +190,28 @@ class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
|
191
190
|
@pulumi.output_type
|
192
191
|
class GetBackendConfigEstAuthenticatorResult(dict):
|
193
192
|
def __init__(__self__, *,
|
194
|
-
cert: Optional[Mapping[str,
|
195
|
-
userpass: Optional[Mapping[str,
|
193
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
194
|
+
userpass: Optional[Mapping[str, _builtins.str]] = None):
|
196
195
|
"""
|
197
|
-
:param Mapping[str,
|
198
|
-
:param Mapping[str,
|
196
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
197
|
+
:param Mapping[str, _builtins.str] userpass: The accessor property for user pass auth backends.
|
199
198
|
"""
|
200
199
|
if cert is not None:
|
201
200
|
pulumi.set(__self__, "cert", cert)
|
202
201
|
if userpass is not None:
|
203
202
|
pulumi.set(__self__, "userpass", userpass)
|
204
203
|
|
205
|
-
@property
|
204
|
+
@_builtins.property
|
206
205
|
@pulumi.getter
|
207
|
-
def cert(self) -> Optional[Mapping[str,
|
206
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
208
207
|
"""
|
209
208
|
The accessor and cert_role properties for cert auth backends.
|
210
209
|
"""
|
211
210
|
return pulumi.get(self, "cert")
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter
|
215
|
-
def userpass(self) -> Optional[Mapping[str,
|
214
|
+
def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
|
216
215
|
"""
|
217
216
|
The accessor property for user pass auth backends.
|
218
217
|
"""
|
@@ -222,28 +221,28 @@ class GetBackendConfigEstAuthenticatorResult(dict):
|
|
222
221
|
@pulumi.output_type
|
223
222
|
class GetBackendConfigScepAuthenticatorResult(dict):
|
224
223
|
def __init__(__self__, *,
|
225
|
-
cert: Optional[Mapping[str,
|
226
|
-
scep: Optional[Mapping[str,
|
224
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
225
|
+
scep: Optional[Mapping[str, _builtins.str]] = None):
|
227
226
|
"""
|
228
|
-
:param Mapping[str,
|
229
|
-
:param Mapping[str,
|
227
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
228
|
+
:param Mapping[str, _builtins.str] scep: The accessor property for scep auth backends.
|
230
229
|
"""
|
231
230
|
if cert is not None:
|
232
231
|
pulumi.set(__self__, "cert", cert)
|
233
232
|
if scep is not None:
|
234
233
|
pulumi.set(__self__, "scep", scep)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter
|
238
|
-
def cert(self) -> Optional[Mapping[str,
|
237
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
239
238
|
"""
|
240
239
|
The accessor and cert_role properties for cert auth backends.
|
241
240
|
"""
|
242
241
|
return pulumi.get(self, "cert")
|
243
242
|
|
244
|
-
@property
|
243
|
+
@_builtins.property
|
245
244
|
@pulumi.getter
|
246
|
-
def scep(self) -> Optional[Mapping[str,
|
245
|
+
def scep(self) -> Optional[Mapping[str, _builtins.str]]:
|
247
246
|
"""
|
248
247
|
The accessor property for scep auth backends.
|
249
248
|
"""
|
@@ -253,16 +252,16 @@ class GetBackendConfigScepAuthenticatorResult(dict):
|
|
253
252
|
@pulumi.output_type
|
254
253
|
class GetBackendConfigScepExternalValidationResult(dict):
|
255
254
|
def __init__(__self__, *,
|
256
|
-
intune: Optional[Mapping[str,
|
255
|
+
intune: Optional[Mapping[str, _builtins.str]] = None):
|
257
256
|
"""
|
258
|
-
:param Mapping[str,
|
257
|
+
:param Mapping[str, _builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
259
258
|
"""
|
260
259
|
if intune is not None:
|
261
260
|
pulumi.set(__self__, "intune", intune)
|
262
261
|
|
263
|
-
@property
|
262
|
+
@_builtins.property
|
264
263
|
@pulumi.getter
|
265
|
-
def intune(self) -> Optional[Mapping[str,
|
264
|
+
def intune(self) -> Optional[Mapping[str, _builtins.str]]:
|
266
265
|
"""
|
267
266
|
The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
268
267
|
"""
|