pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -77,30 +76,30 @@ class GetBackendIssuerResult:
|
|
77
76
|
raise TypeError("Expected argument 'usage' to be a str")
|
78
77
|
pulumi.set(__self__, "usage", usage)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def backend(self) ->
|
81
|
+
def backend(self) -> _builtins.str:
|
83
82
|
return pulumi.get(self, "backend")
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="caChains")
|
87
|
-
def ca_chains(self) -> Sequence[
|
86
|
+
def ca_chains(self) -> Sequence[_builtins.str]:
|
88
87
|
"""
|
89
88
|
The CA chain as a list of format specific certificates.
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "ca_chains")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def certificate(self) ->
|
94
|
+
def certificate(self) -> _builtins.str:
|
96
95
|
"""
|
97
96
|
Certificate associated with this issuer.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "certificate")
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
103
|
-
def disable_critical_extension_checks(self) -> Optional[
|
102
|
+
def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
|
104
103
|
"""
|
105
104
|
This determines whether this
|
106
105
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -108,9 +107,9 @@ class GetBackendIssuerResult:
|
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "disable_critical_extension_checks")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter(name="disableNameChecks")
|
113
|
-
def disable_name_checks(self) -> Optional[
|
112
|
+
def disable_name_checks(self) -> Optional[_builtins.bool]:
|
114
113
|
"""
|
115
114
|
This determines whether this issuer is able
|
116
115
|
to issue certificates where the chain of trust (including the final issued
|
@@ -119,9 +118,9 @@ class GetBackendIssuerResult:
|
|
119
118
|
"""
|
120
119
|
return pulumi.get(self, "disable_name_checks")
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="disableNameConstraintChecks")
|
124
|
-
def disable_name_constraint_checks(self) -> Optional[
|
123
|
+
def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
|
125
124
|
"""
|
126
125
|
This determines whether this
|
127
126
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -130,9 +129,9 @@ class GetBackendIssuerResult:
|
|
130
129
|
"""
|
131
130
|
return pulumi.get(self, "disable_name_constraint_checks")
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="disablePathLengthChecks")
|
135
|
-
def disable_path_length_checks(self) -> Optional[
|
134
|
+
def disable_path_length_checks(self) -> Optional[_builtins.bool]:
|
136
135
|
"""
|
137
136
|
This determines whether this issuer
|
138
137
|
is able to issue certificates where the chain of trust (including the final
|
@@ -141,68 +140,68 @@ class GetBackendIssuerResult:
|
|
141
140
|
"""
|
142
141
|
return pulumi.get(self, "disable_path_length_checks")
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter
|
146
|
-
def id(self) ->
|
145
|
+
def id(self) -> _builtins.str:
|
147
146
|
"""
|
148
147
|
The provider-assigned unique ID for this managed resource.
|
149
148
|
"""
|
150
149
|
return pulumi.get(self, "id")
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter(name="issuerId")
|
154
|
-
def issuer_id(self) ->
|
153
|
+
def issuer_id(self) -> _builtins.str:
|
155
154
|
"""
|
156
155
|
ID of the issuer.
|
157
156
|
"""
|
158
157
|
return pulumi.get(self, "issuer_id")
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="issuerName")
|
162
|
-
def issuer_name(self) ->
|
161
|
+
def issuer_name(self) -> _builtins.str:
|
163
162
|
"""
|
164
163
|
Name of the issuer.
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "issuer_name")
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter(name="issuerRef")
|
170
|
-
def issuer_ref(self) ->
|
169
|
+
def issuer_ref(self) -> _builtins.str:
|
171
170
|
return pulumi.get(self, "issuer_ref")
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter(name="keyId")
|
175
|
-
def key_id(self) ->
|
174
|
+
def key_id(self) -> _builtins.str:
|
176
175
|
"""
|
177
176
|
ID of the key used by the issuer.
|
178
177
|
"""
|
179
178
|
return pulumi.get(self, "key_id")
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter(name="leafNotAfterBehavior")
|
183
|
-
def leaf_not_after_behavior(self) ->
|
182
|
+
def leaf_not_after_behavior(self) -> _builtins.str:
|
184
183
|
"""
|
185
184
|
Behavior of a leaf's NotAfter field during issuance.
|
186
185
|
"""
|
187
186
|
return pulumi.get(self, "leaf_not_after_behavior")
|
188
187
|
|
189
|
-
@property
|
188
|
+
@_builtins.property
|
190
189
|
@pulumi.getter(name="manualChains")
|
191
|
-
def manual_chains(self) -> Sequence[
|
190
|
+
def manual_chains(self) -> Sequence[_builtins.str]:
|
192
191
|
"""
|
193
192
|
Chain of issuer references to build this issuer's computed
|
194
193
|
CAChain field from, when non-empty.
|
195
194
|
"""
|
196
195
|
return pulumi.get(self, "manual_chains")
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
@pulumi.getter
|
200
|
-
def namespace(self) -> Optional[
|
199
|
+
def namespace(self) -> Optional[_builtins.str]:
|
201
200
|
return pulumi.get(self, "namespace")
|
202
201
|
|
203
|
-
@property
|
202
|
+
@_builtins.property
|
204
203
|
@pulumi.getter
|
205
|
-
def usage(self) ->
|
204
|
+
def usage(self) -> _builtins.str:
|
206
205
|
"""
|
207
206
|
Allowed usages for this issuer.
|
208
207
|
"""
|
@@ -233,13 +232,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
233
232
|
usage=self.usage)
|
234
233
|
|
235
234
|
|
236
|
-
def get_backend_issuer(backend: Optional[
|
237
|
-
disable_critical_extension_checks: Optional[
|
238
|
-
disable_name_checks: Optional[
|
239
|
-
disable_name_constraint_checks: Optional[
|
240
|
-
disable_path_length_checks: Optional[
|
241
|
-
issuer_ref: Optional[
|
242
|
-
namespace: Optional[
|
235
|
+
def get_backend_issuer(backend: Optional[_builtins.str] = None,
|
236
|
+
disable_critical_extension_checks: Optional[_builtins.bool] = None,
|
237
|
+
disable_name_checks: Optional[_builtins.bool] = None,
|
238
|
+
disable_name_constraint_checks: Optional[_builtins.bool] = None,
|
239
|
+
disable_path_length_checks: Optional[_builtins.bool] = None,
|
240
|
+
issuer_ref: Optional[_builtins.str] = None,
|
241
|
+
namespace: Optional[_builtins.str] = None,
|
243
242
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
244
243
|
"""
|
245
244
|
## Example Usage
|
@@ -252,7 +251,7 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
252
251
|
path="pki",
|
253
252
|
type="pki",
|
254
253
|
description="PKI secret engine mount")
|
255
|
-
root = vault.
|
254
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
256
255
|
backend=pki.path,
|
257
256
|
type="internal",
|
258
257
|
common_name="example",
|
@@ -263,25 +262,25 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
263
262
|
```
|
264
263
|
|
265
264
|
|
266
|
-
:param
|
265
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
267
266
|
read the issuer from, with no leading or trailing `/`s.
|
268
|
-
:param
|
267
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
269
268
|
issuer is able to issue certificates where the chain of trust (including the
|
270
269
|
issued certificate) contain critical extensions not processed by Vault.
|
271
|
-
:param
|
270
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
272
271
|
to issue certificates where the chain of trust (including the final issued
|
273
272
|
certificate) contains a link in which the subject of the issuing certificate
|
274
273
|
does not match the named issuer of the certificate it signed.
|
275
|
-
:param
|
274
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
276
275
|
issuer is able to issue certificates where the chain of trust (including the
|
277
276
|
final issued certificate) violates the name constraints critical extension of
|
278
277
|
one of the issuer certificates in the chain.
|
279
|
-
:param
|
278
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
280
279
|
is able to issue certificates where the chain of trust (including the final
|
281
280
|
issued certificate) is longer than allowed by a certificate authority in that
|
282
281
|
chain.
|
283
|
-
:param
|
284
|
-
:param
|
282
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
283
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
285
284
|
The value should not contain leading or trailing forward slashes.
|
286
285
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
287
286
|
*Available only for Vault Enterprise*.
|
@@ -314,13 +313,13 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
|
|
314
313
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
315
314
|
namespace=pulumi.get(__ret__, 'namespace'),
|
316
315
|
usage=pulumi.get(__ret__, 'usage'))
|
317
|
-
def get_backend_issuer_output(backend: Optional[pulumi.Input[
|
318
|
-
disable_critical_extension_checks: Optional[pulumi.Input[Optional[
|
319
|
-
disable_name_checks: Optional[pulumi.Input[Optional[
|
320
|
-
disable_name_constraint_checks: Optional[pulumi.Input[Optional[
|
321
|
-
disable_path_length_checks: Optional[pulumi.Input[Optional[
|
322
|
-
issuer_ref: Optional[pulumi.Input[
|
323
|
-
namespace: Optional[pulumi.Input[Optional[
|
316
|
+
def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
317
|
+
disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
318
|
+
disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
319
|
+
disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
320
|
+
disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
321
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
324
323
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
325
324
|
"""
|
326
325
|
## Example Usage
|
@@ -333,7 +332,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
|
|
333
332
|
path="pki",
|
334
333
|
type="pki",
|
335
334
|
description="PKI secret engine mount")
|
336
|
-
root = vault.
|
335
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
337
336
|
backend=pki.path,
|
338
337
|
type="internal",
|
339
338
|
common_name="example",
|
@@ -344,25 +343,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
|
|
344
343
|
```
|
345
344
|
|
346
345
|
|
347
|
-
:param
|
346
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
348
347
|
read the issuer from, with no leading or trailing `/`s.
|
349
|
-
:param
|
348
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
350
349
|
issuer is able to issue certificates where the chain of trust (including the
|
351
350
|
issued certificate) contain critical extensions not processed by Vault.
|
352
|
-
:param
|
351
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
353
352
|
to issue certificates where the chain of trust (including the final issued
|
354
353
|
certificate) contains a link in which the subject of the issuing certificate
|
355
354
|
does not match the named issuer of the certificate it signed.
|
356
|
-
:param
|
355
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
357
356
|
issuer is able to issue certificates where the chain of trust (including the
|
358
357
|
final issued certificate) violates the name constraints critical extension of
|
359
358
|
one of the issuer certificates in the chain.
|
360
|
-
:param
|
359
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
361
360
|
is able to issue certificates where the chain of trust (including the final
|
362
361
|
issued certificate) is longer than allowed by a certificate authority in that
|
363
362
|
chain.
|
364
|
-
:param
|
365
|
-
:param
|
363
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
364
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
366
365
|
The value should not contain leading or trailing forward slashes.
|
367
366
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
367
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -47,46 +46,46 @@ class GetBackendIssuersResult:
|
|
47
46
|
raise TypeError("Expected argument 'namespace' to be a str")
|
48
47
|
pulumi.set(__self__, "namespace", namespace)
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
@pulumi.getter
|
52
|
-
def backend(self) ->
|
51
|
+
def backend(self) -> _builtins.str:
|
53
52
|
return pulumi.get(self, "backend")
|
54
53
|
|
55
|
-
@property
|
54
|
+
@_builtins.property
|
56
55
|
@pulumi.getter
|
57
|
-
def id(self) ->
|
56
|
+
def id(self) -> _builtins.str:
|
58
57
|
"""
|
59
58
|
The provider-assigned unique ID for this managed resource.
|
60
59
|
"""
|
61
60
|
return pulumi.get(self, "id")
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter(name="keyInfo")
|
65
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, _builtins.str]:
|
66
65
|
"""
|
67
66
|
Map of issuer strings read from Vault.
|
68
67
|
"""
|
69
68
|
return pulumi.get(self, "key_info")
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="keyInfoJson")
|
73
|
-
def key_info_json(self) ->
|
72
|
+
def key_info_json(self) -> _builtins.str:
|
74
73
|
"""
|
75
74
|
JSON-encoded issuer data read from Vault.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "key_info_json")
|
78
77
|
|
79
|
-
@property
|
78
|
+
@_builtins.property
|
80
79
|
@pulumi.getter
|
81
|
-
def keys(self) -> Sequence[
|
80
|
+
def keys(self) -> Sequence[_builtins.str]:
|
82
81
|
"""
|
83
82
|
Keys used by issuers under the backend path.
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "keys")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def namespace(self) -> Optional[
|
88
|
+
def namespace(self) -> Optional[_builtins.str]:
|
90
89
|
return pulumi.get(self, "namespace")
|
91
90
|
|
92
91
|
|
@@ -104,8 +103,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
|
|
104
103
|
namespace=self.namespace)
|
105
104
|
|
106
105
|
|
107
|
-
def get_backend_issuers(backend: Optional[
|
108
|
-
namespace: Optional[
|
106
|
+
def get_backend_issuers(backend: Optional[_builtins.str] = None,
|
107
|
+
namespace: Optional[_builtins.str] = None,
|
109
108
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
|
110
109
|
"""
|
111
110
|
## Example Usage
|
@@ -118,7 +117,7 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
118
117
|
path="pki",
|
119
118
|
type="pki",
|
120
119
|
description="PKI secret engine mount")
|
121
|
-
root = vault.
|
120
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
122
121
|
backend=pki.path,
|
123
122
|
type="internal",
|
124
123
|
common_name="example",
|
@@ -128,9 +127,9 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
128
127
|
```
|
129
128
|
|
130
129
|
|
131
|
-
:param
|
130
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
132
131
|
read the issuers from, with no leading or trailing `/`s.
|
133
|
-
:param
|
132
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
134
133
|
The value should not contain leading or trailing forward slashes.
|
135
134
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
136
135
|
*Available only for Vault Enterprise*.
|
@@ -148,8 +147,8 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
|
|
148
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
149
148
|
keys=pulumi.get(__ret__, 'keys'),
|
150
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
151
|
-
def get_backend_issuers_output(backend: Optional[pulumi.Input[
|
152
|
-
namespace: Optional[pulumi.Input[Optional[
|
150
|
+
def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
151
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
153
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
154
153
|
"""
|
155
154
|
## Example Usage
|
@@ -162,7 +161,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
|
|
162
161
|
path="pki",
|
163
162
|
type="pki",
|
164
163
|
description="PKI secret engine mount")
|
165
|
-
root = vault.
|
164
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
166
165
|
backend=pki.path,
|
167
166
|
type="internal",
|
168
167
|
common_name="example",
|
@@ -172,9 +171,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
|
|
172
171
|
```
|
173
172
|
|
174
173
|
|
175
|
-
:param
|
174
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
176
175
|
read the issuers from, with no leading or trailing `/`s.
|
177
|
-
:param
|
176
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
178
177
|
The value should not contain leading or trailing forward slashes.
|
179
178
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
179
|
*Available only for Vault Enterprise*.
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -50,51 +49,51 @@ class GetBackendKeyResult:
|
|
50
49
|
raise TypeError("Expected argument 'namespace' to be a str")
|
51
50
|
pulumi.set(__self__, "namespace", namespace)
|
52
51
|
|
53
|
-
@property
|
52
|
+
@_builtins.property
|
54
53
|
@pulumi.getter
|
55
|
-
def backend(self) ->
|
54
|
+
def backend(self) -> _builtins.str:
|
56
55
|
return pulumi.get(self, "backend")
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def id(self) ->
|
59
|
+
def id(self) -> _builtins.str:
|
61
60
|
"""
|
62
61
|
The provider-assigned unique ID for this managed resource.
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "id")
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter(name="keyId")
|
68
|
-
def key_id(self) ->
|
67
|
+
def key_id(self) -> _builtins.str:
|
69
68
|
"""
|
70
69
|
ID of the key.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "key_id")
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter(name="keyName")
|
76
|
-
def key_name(self) ->
|
75
|
+
def key_name(self) -> _builtins.str:
|
77
76
|
"""
|
78
77
|
Name of the key.
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "key_name")
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter(name="keyRef")
|
84
|
-
def key_ref(self) ->
|
83
|
+
def key_ref(self) -> _builtins.str:
|
85
84
|
return pulumi.get(self, "key_ref")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter(name="keyType")
|
89
|
-
def key_type(self) ->
|
88
|
+
def key_type(self) -> _builtins.str:
|
90
89
|
"""
|
91
90
|
Type of the key.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "key_type")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[
|
96
|
+
def namespace(self) -> Optional[_builtins.str]:
|
98
97
|
return pulumi.get(self, "namespace")
|
99
98
|
|
100
99
|
|
@@ -113,9 +112,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
|
|
113
112
|
namespace=self.namespace)
|
114
113
|
|
115
114
|
|
116
|
-
def get_backend_key(backend: Optional[
|
117
|
-
key_ref: Optional[
|
118
|
-
namespace: Optional[
|
115
|
+
def get_backend_key(backend: Optional[_builtins.str] = None,
|
116
|
+
key_ref: Optional[_builtins.str] = None,
|
117
|
+
namespace: Optional[_builtins.str] = None,
|
119
118
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
|
120
119
|
"""
|
121
120
|
## Example Usage
|
@@ -128,7 +127,7 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
128
127
|
path="pki",
|
129
128
|
type="pki",
|
130
129
|
description="PKI secret engine mount")
|
131
|
-
key = vault.
|
130
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
132
131
|
backend=pki.path,
|
133
132
|
type="internal",
|
134
133
|
key_name="example",
|
@@ -139,10 +138,10 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
139
138
|
```
|
140
139
|
|
141
140
|
|
142
|
-
:param
|
141
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
143
142
|
read the key from, with no leading or trailing `/`s.
|
144
|
-
:param
|
145
|
-
:param
|
143
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
144
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
146
145
|
The value should not contain leading or trailing forward slashes.
|
147
146
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
147
|
*Available only for Vault Enterprise*.
|
@@ -162,9 +161,9 @@ def get_backend_key(backend: Optional[builtins.str] = None,
|
|
162
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
163
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
164
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
165
|
-
def get_backend_key_output(backend: Optional[pulumi.Input[
|
166
|
-
key_ref: Optional[pulumi.Input[
|
167
|
-
namespace: Optional[pulumi.Input[Optional[
|
164
|
+
def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
165
|
+
key_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
166
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
168
167
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
169
168
|
"""
|
170
169
|
## Example Usage
|
@@ -177,7 +176,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
|
177
176
|
path="pki",
|
178
177
|
type="pki",
|
179
178
|
description="PKI secret engine mount")
|
180
|
-
key = vault.
|
179
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
181
180
|
backend=pki.path,
|
182
181
|
type="internal",
|
183
182
|
key_name="example",
|
@@ -188,10 +187,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
|
188
187
|
```
|
189
188
|
|
190
189
|
|
191
|
-
:param
|
190
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
192
191
|
read the key from, with no leading or trailing `/`s.
|
193
|
-
:param
|
194
|
-
:param
|
192
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
193
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
195
194
|
The value should not contain leading or trailing forward slashes.
|
196
195
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
197
196
|
*Available only for Vault Enterprise*.
|