pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['BackendAcmeEabArgs', 'BackendAcmeEab']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class BackendAcmeEabArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
issuer: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
role: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
role: Optional[pulumi.Input[_builtins.str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a BackendAcmeEab resource.
|
29
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
30
29
|
create the EAB token within, with no leading or trailing `/`s.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
37
36
|
|
38
37
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
39
38
|
|
@@ -50,9 +49,9 @@ class BackendAcmeEabArgs:
|
|
50
49
|
if role is not None:
|
51
50
|
pulumi.set(__self__, "role", role)
|
52
51
|
|
53
|
-
@property
|
52
|
+
@_builtins.property
|
54
53
|
@pulumi.getter
|
55
|
-
def backend(self) -> pulumi.Input[
|
54
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
56
55
|
"""
|
57
56
|
The path to the PKI secret backend to
|
58
57
|
create the EAB token within, with no leading or trailing `/`s.
|
@@ -60,24 +59,24 @@ class BackendAcmeEabArgs:
|
|
60
59
|
return pulumi.get(self, "backend")
|
61
60
|
|
62
61
|
@backend.setter
|
63
|
-
def backend(self, value: pulumi.Input[
|
62
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
64
63
|
pulumi.set(self, "backend", value)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter
|
68
|
-
def issuer(self) -> Optional[pulumi.Input[
|
67
|
+
def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
69
68
|
"""
|
70
69
|
Create an EAB token that is specific to an issuer's ACME directory.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "issuer")
|
73
72
|
|
74
73
|
@issuer.setter
|
75
|
-
def issuer(self, value: Optional[pulumi.Input[
|
74
|
+
def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
|
76
75
|
pulumi.set(self, "issuer", value)
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter
|
80
|
-
def namespace(self) -> Optional[pulumi.Input[
|
79
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
81
80
|
"""
|
82
81
|
The namespace of the target resource.
|
83
82
|
The value should not contain leading or trailing forward slashes.
|
@@ -87,12 +86,12 @@ class BackendAcmeEabArgs:
|
|
87
86
|
return pulumi.get(self, "namespace")
|
88
87
|
|
89
88
|
@namespace.setter
|
90
|
-
def namespace(self, value: Optional[pulumi.Input[
|
89
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
91
90
|
pulumi.set(self, "namespace", value)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def role(self) -> Optional[pulumi.Input[
|
94
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
96
95
|
"""
|
97
96
|
Create an EAB token that is specific to a role's ACME directory.
|
98
97
|
|
@@ -106,37 +105,37 @@ class BackendAcmeEabArgs:
|
|
106
105
|
return pulumi.get(self, "role")
|
107
106
|
|
108
107
|
@role.setter
|
109
|
-
def role(self, value: Optional[pulumi.Input[
|
108
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
110
109
|
pulumi.set(self, "role", value)
|
111
110
|
|
112
111
|
|
113
112
|
@pulumi.input_type
|
114
113
|
class _BackendAcmeEabState:
|
115
114
|
def __init__(__self__, *,
|
116
|
-
acme_directory: Optional[pulumi.Input[
|
117
|
-
backend: Optional[pulumi.Input[
|
118
|
-
created_on: Optional[pulumi.Input[
|
119
|
-
eab_id: Optional[pulumi.Input[
|
120
|
-
issuer: Optional[pulumi.Input[
|
121
|
-
key: Optional[pulumi.Input[
|
122
|
-
key_type: Optional[pulumi.Input[
|
123
|
-
namespace: Optional[pulumi.Input[
|
124
|
-
role: Optional[pulumi.Input[
|
115
|
+
acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
|
116
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
117
|
+
created_on: Optional[pulumi.Input[_builtins.str]] = None,
|
118
|
+
eab_id: Optional[pulumi.Input[_builtins.str]] = None,
|
119
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
120
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
121
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
122
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
123
|
+
role: Optional[pulumi.Input[_builtins.str]] = None):
|
125
124
|
"""
|
126
125
|
Input properties used for looking up and filtering BackendAcmeEab resources.
|
127
|
-
:param pulumi.Input[
|
128
|
-
:param pulumi.Input[
|
126
|
+
:param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
|
127
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
129
128
|
create the EAB token within, with no leading or trailing `/`s.
|
130
|
-
:param pulumi.Input[
|
131
|
-
:param pulumi.Input[
|
132
|
-
:param pulumi.Input[
|
133
|
-
:param pulumi.Input[
|
134
|
-
:param pulumi.Input[
|
135
|
-
:param pulumi.Input[
|
129
|
+
:param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
|
130
|
+
:param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
|
131
|
+
:param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
132
|
+
:param pulumi.Input[_builtins.str] key: The EAB token
|
133
|
+
:param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
|
134
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
136
135
|
The value should not contain leading or trailing forward slashes.
|
137
136
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
138
137
|
*Available only for Vault Enterprise*.
|
139
|
-
:param pulumi.Input[
|
138
|
+
:param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
140
139
|
|
141
140
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
142
141
|
|
@@ -164,21 +163,21 @@ class _BackendAcmeEabState:
|
|
164
163
|
if role is not None:
|
165
164
|
pulumi.set(__self__, "role", role)
|
166
165
|
|
167
|
-
@property
|
166
|
+
@_builtins.property
|
168
167
|
@pulumi.getter(name="acmeDirectory")
|
169
|
-
def acme_directory(self) -> Optional[pulumi.Input[
|
168
|
+
def acme_directory(self) -> Optional[pulumi.Input[_builtins.str]]:
|
170
169
|
"""
|
171
170
|
The ACME directory to which the key belongs
|
172
171
|
"""
|
173
172
|
return pulumi.get(self, "acme_directory")
|
174
173
|
|
175
174
|
@acme_directory.setter
|
176
|
-
def acme_directory(self, value: Optional[pulumi.Input[
|
175
|
+
def acme_directory(self, value: Optional[pulumi.Input[_builtins.str]]):
|
177
176
|
pulumi.set(self, "acme_directory", value)
|
178
177
|
|
179
|
-
@property
|
178
|
+
@_builtins.property
|
180
179
|
@pulumi.getter
|
181
|
-
def backend(self) -> Optional[pulumi.Input[
|
180
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
182
181
|
"""
|
183
182
|
The path to the PKI secret backend to
|
184
183
|
create the EAB token within, with no leading or trailing `/`s.
|
@@ -186,72 +185,72 @@ class _BackendAcmeEabState:
|
|
186
185
|
return pulumi.get(self, "backend")
|
187
186
|
|
188
187
|
@backend.setter
|
189
|
-
def backend(self, value: Optional[pulumi.Input[
|
188
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
190
189
|
pulumi.set(self, "backend", value)
|
191
190
|
|
192
|
-
@property
|
191
|
+
@_builtins.property
|
193
192
|
@pulumi.getter(name="createdOn")
|
194
|
-
def created_on(self) -> Optional[pulumi.Input[
|
193
|
+
def created_on(self) -> Optional[pulumi.Input[_builtins.str]]:
|
195
194
|
"""
|
196
195
|
An RFC3339 formatted date time when the EAB token was created
|
197
196
|
"""
|
198
197
|
return pulumi.get(self, "created_on")
|
199
198
|
|
200
199
|
@created_on.setter
|
201
|
-
def created_on(self, value: Optional[pulumi.Input[
|
200
|
+
def created_on(self, value: Optional[pulumi.Input[_builtins.str]]):
|
202
201
|
pulumi.set(self, "created_on", value)
|
203
202
|
|
204
|
-
@property
|
203
|
+
@_builtins.property
|
205
204
|
@pulumi.getter(name="eabId")
|
206
|
-
def eab_id(self) -> Optional[pulumi.Input[
|
205
|
+
def eab_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
207
206
|
"""
|
208
207
|
The identifier of a specific ACME EAB token
|
209
208
|
"""
|
210
209
|
return pulumi.get(self, "eab_id")
|
211
210
|
|
212
211
|
@eab_id.setter
|
213
|
-
def eab_id(self, value: Optional[pulumi.Input[
|
212
|
+
def eab_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
214
213
|
pulumi.set(self, "eab_id", value)
|
215
214
|
|
216
|
-
@property
|
215
|
+
@_builtins.property
|
217
216
|
@pulumi.getter
|
218
|
-
def issuer(self) -> Optional[pulumi.Input[
|
217
|
+
def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
219
218
|
"""
|
220
219
|
Create an EAB token that is specific to an issuer's ACME directory.
|
221
220
|
"""
|
222
221
|
return pulumi.get(self, "issuer")
|
223
222
|
|
224
223
|
@issuer.setter
|
225
|
-
def issuer(self, value: Optional[pulumi.Input[
|
224
|
+
def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
|
226
225
|
pulumi.set(self, "issuer", value)
|
227
226
|
|
228
|
-
@property
|
227
|
+
@_builtins.property
|
229
228
|
@pulumi.getter
|
230
|
-
def key(self) -> Optional[pulumi.Input[
|
229
|
+
def key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
231
230
|
"""
|
232
231
|
The EAB token
|
233
232
|
"""
|
234
233
|
return pulumi.get(self, "key")
|
235
234
|
|
236
235
|
@key.setter
|
237
|
-
def key(self, value: Optional[pulumi.Input[
|
236
|
+
def key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
238
237
|
pulumi.set(self, "key", value)
|
239
238
|
|
240
|
-
@property
|
239
|
+
@_builtins.property
|
241
240
|
@pulumi.getter(name="keyType")
|
242
|
-
def key_type(self) -> Optional[pulumi.Input[
|
241
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
243
242
|
"""
|
244
243
|
The key type of the EAB key
|
245
244
|
"""
|
246
245
|
return pulumi.get(self, "key_type")
|
247
246
|
|
248
247
|
@key_type.setter
|
249
|
-
def key_type(self, value: Optional[pulumi.Input[
|
248
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
250
249
|
pulumi.set(self, "key_type", value)
|
251
250
|
|
252
|
-
@property
|
251
|
+
@_builtins.property
|
253
252
|
@pulumi.getter
|
254
|
-
def namespace(self) -> Optional[pulumi.Input[
|
253
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
255
254
|
"""
|
256
255
|
The namespace of the target resource.
|
257
256
|
The value should not contain leading or trailing forward slashes.
|
@@ -261,12 +260,12 @@ class _BackendAcmeEabState:
|
|
261
260
|
return pulumi.get(self, "namespace")
|
262
261
|
|
263
262
|
@namespace.setter
|
264
|
-
def namespace(self, value: Optional[pulumi.Input[
|
263
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
265
264
|
pulumi.set(self, "namespace", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter
|
269
|
-
def role(self) -> Optional[pulumi.Input[
|
268
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
270
269
|
"""
|
271
270
|
Create an EAB token that is specific to a role's ACME directory.
|
272
271
|
|
@@ -280,7 +279,7 @@ class _BackendAcmeEabState:
|
|
280
279
|
return pulumi.get(self, "role")
|
281
280
|
|
282
281
|
@role.setter
|
283
|
-
def role(self, value: Optional[pulumi.Input[
|
282
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
284
283
|
pulumi.set(self, "role", value)
|
285
284
|
|
286
285
|
|
@@ -290,10 +289,10 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
290
289
|
def __init__(__self__,
|
291
290
|
resource_name: str,
|
292
291
|
opts: Optional[pulumi.ResourceOptions] = None,
|
293
|
-
backend: Optional[pulumi.Input[
|
294
|
-
issuer: Optional[pulumi.Input[
|
295
|
-
namespace: Optional[pulumi.Input[
|
296
|
-
role: Optional[pulumi.Input[
|
292
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
293
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
294
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
297
296
|
__props__=None):
|
298
297
|
"""
|
299
298
|
Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
|
@@ -308,7 +307,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
308
307
|
path="pki",
|
309
308
|
type="pki",
|
310
309
|
description="PKI secret engine mount")
|
311
|
-
test_backend_acme_eab = vault.
|
310
|
+
test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
|
312
311
|
```
|
313
312
|
|
314
313
|
## Import
|
@@ -319,14 +318,14 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
319
318
|
|
320
319
|
:param str resource_name: The name of the resource.
|
321
320
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
322
|
-
:param pulumi.Input[
|
321
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
323
322
|
create the EAB token within, with no leading or trailing `/`s.
|
324
|
-
:param pulumi.Input[
|
325
|
-
:param pulumi.Input[
|
323
|
+
:param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
324
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
326
325
|
The value should not contain leading or trailing forward slashes.
|
327
326
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
328
327
|
*Available only for Vault Enterprise*.
|
329
|
-
:param pulumi.Input[
|
328
|
+
:param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
330
329
|
|
331
330
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
332
331
|
|
@@ -354,7 +353,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
354
353
|
path="pki",
|
355
354
|
type="pki",
|
356
355
|
description="PKI secret engine mount")
|
357
|
-
test_backend_acme_eab = vault.
|
356
|
+
test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
|
358
357
|
```
|
359
358
|
|
360
359
|
## Import
|
@@ -378,10 +377,10 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
378
377
|
def _internal_init(__self__,
|
379
378
|
resource_name: str,
|
380
379
|
opts: Optional[pulumi.ResourceOptions] = None,
|
381
|
-
backend: Optional[pulumi.Input[
|
382
|
-
issuer: Optional[pulumi.Input[
|
383
|
-
namespace: Optional[pulumi.Input[
|
384
|
-
role: Optional[pulumi.Input[
|
380
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
381
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
382
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
383
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
385
384
|
__props__=None):
|
386
385
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
387
386
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -414,15 +413,15 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
414
413
|
def get(resource_name: str,
|
415
414
|
id: pulumi.Input[str],
|
416
415
|
opts: Optional[pulumi.ResourceOptions] = None,
|
417
|
-
acme_directory: Optional[pulumi.Input[
|
418
|
-
backend: Optional[pulumi.Input[
|
419
|
-
created_on: Optional[pulumi.Input[
|
420
|
-
eab_id: Optional[pulumi.Input[
|
421
|
-
issuer: Optional[pulumi.Input[
|
422
|
-
key: Optional[pulumi.Input[
|
423
|
-
key_type: Optional[pulumi.Input[
|
424
|
-
namespace: Optional[pulumi.Input[
|
425
|
-
role: Optional[pulumi.Input[
|
416
|
+
acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
|
417
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
418
|
+
created_on: Optional[pulumi.Input[_builtins.str]] = None,
|
419
|
+
eab_id: Optional[pulumi.Input[_builtins.str]] = None,
|
420
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
421
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
422
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
423
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
424
|
+
role: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendAcmeEab':
|
426
425
|
"""
|
427
426
|
Get an existing BackendAcmeEab resource's state with the given name, id, and optional extra
|
428
427
|
properties used to qualify the lookup.
|
@@ -430,19 +429,19 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
430
429
|
:param str resource_name: The unique name of the resulting resource.
|
431
430
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
432
431
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
433
|
-
:param pulumi.Input[
|
434
|
-
:param pulumi.Input[
|
432
|
+
:param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
|
433
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
435
434
|
create the EAB token within, with no leading or trailing `/`s.
|
436
|
-
:param pulumi.Input[
|
437
|
-
:param pulumi.Input[
|
438
|
-
:param pulumi.Input[
|
439
|
-
:param pulumi.Input[
|
440
|
-
:param pulumi.Input[
|
441
|
-
:param pulumi.Input[
|
435
|
+
:param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
|
436
|
+
:param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
|
437
|
+
:param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
438
|
+
:param pulumi.Input[_builtins.str] key: The EAB token
|
439
|
+
:param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
|
440
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
442
441
|
The value should not contain leading or trailing forward slashes.
|
443
442
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
444
443
|
*Available only for Vault Enterprise*.
|
445
|
-
:param pulumi.Input[
|
444
|
+
:param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
446
445
|
|
447
446
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
448
447
|
|
@@ -466,66 +465,66 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
466
465
|
__props__.__dict__["role"] = role
|
467
466
|
return BackendAcmeEab(resource_name, opts=opts, __props__=__props__)
|
468
467
|
|
469
|
-
@property
|
468
|
+
@_builtins.property
|
470
469
|
@pulumi.getter(name="acmeDirectory")
|
471
|
-
def acme_directory(self) -> pulumi.Output[
|
470
|
+
def acme_directory(self) -> pulumi.Output[_builtins.str]:
|
472
471
|
"""
|
473
472
|
The ACME directory to which the key belongs
|
474
473
|
"""
|
475
474
|
return pulumi.get(self, "acme_directory")
|
476
475
|
|
477
|
-
@property
|
476
|
+
@_builtins.property
|
478
477
|
@pulumi.getter
|
479
|
-
def backend(self) -> pulumi.Output[
|
478
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
480
479
|
"""
|
481
480
|
The path to the PKI secret backend to
|
482
481
|
create the EAB token within, with no leading or trailing `/`s.
|
483
482
|
"""
|
484
483
|
return pulumi.get(self, "backend")
|
485
484
|
|
486
|
-
@property
|
485
|
+
@_builtins.property
|
487
486
|
@pulumi.getter(name="createdOn")
|
488
|
-
def created_on(self) -> pulumi.Output[
|
487
|
+
def created_on(self) -> pulumi.Output[_builtins.str]:
|
489
488
|
"""
|
490
489
|
An RFC3339 formatted date time when the EAB token was created
|
491
490
|
"""
|
492
491
|
return pulumi.get(self, "created_on")
|
493
492
|
|
494
|
-
@property
|
493
|
+
@_builtins.property
|
495
494
|
@pulumi.getter(name="eabId")
|
496
|
-
def eab_id(self) -> pulumi.Output[
|
495
|
+
def eab_id(self) -> pulumi.Output[_builtins.str]:
|
497
496
|
"""
|
498
497
|
The identifier of a specific ACME EAB token
|
499
498
|
"""
|
500
499
|
return pulumi.get(self, "eab_id")
|
501
500
|
|
502
|
-
@property
|
501
|
+
@_builtins.property
|
503
502
|
@pulumi.getter
|
504
|
-
def issuer(self) -> pulumi.Output[Optional[
|
503
|
+
def issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
|
505
504
|
"""
|
506
505
|
Create an EAB token that is specific to an issuer's ACME directory.
|
507
506
|
"""
|
508
507
|
return pulumi.get(self, "issuer")
|
509
508
|
|
510
|
-
@property
|
509
|
+
@_builtins.property
|
511
510
|
@pulumi.getter
|
512
|
-
def key(self) -> pulumi.Output[
|
511
|
+
def key(self) -> pulumi.Output[_builtins.str]:
|
513
512
|
"""
|
514
513
|
The EAB token
|
515
514
|
"""
|
516
515
|
return pulumi.get(self, "key")
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter(name="keyType")
|
520
|
-
def key_type(self) -> pulumi.Output[
|
519
|
+
def key_type(self) -> pulumi.Output[_builtins.str]:
|
521
520
|
"""
|
522
521
|
The key type of the EAB key
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "key_type")
|
525
524
|
|
526
|
-
@property
|
525
|
+
@_builtins.property
|
527
526
|
@pulumi.getter
|
528
|
-
def namespace(self) -> pulumi.Output[Optional[
|
527
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
529
528
|
"""
|
530
529
|
The namespace of the target resource.
|
531
530
|
The value should not contain leading or trailing forward slashes.
|
@@ -534,9 +533,9 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
534
533
|
"""
|
535
534
|
return pulumi.get(self, "namespace")
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter
|
539
|
-
def role(self) -> pulumi.Output[Optional[
|
538
|
+
def role(self) -> pulumi.Output[Optional[_builtins.str]]:
|
540
539
|
"""
|
541
540
|
Create an EAB token that is specific to a role's ACME directory.
|
542
541
|
|