pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,25 +19,25 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendCaArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
generate_signing_key: Optional[pulumi.Input[
|
25
|
-
key_bits: Optional[pulumi.Input[
|
26
|
-
key_type: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
private_key: Optional[pulumi.Input[
|
29
|
-
public_key: Optional[pulumi.Input[
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
25
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None):
|
30
29
|
"""
|
31
30
|
The set of arguments for constructing a SecretBackendCa resource.
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
32
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
33
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
34
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
40
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
42
41
|
"""
|
43
42
|
if backend is not None:
|
44
43
|
pulumi.set(__self__, "backend", backend)
|
@@ -55,57 +54,57 @@ class SecretBackendCaArgs:
|
|
55
54
|
if public_key is not None:
|
56
55
|
pulumi.set(__self__, "public_key", public_key)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[
|
59
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
61
60
|
"""
|
62
61
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "backend")
|
65
64
|
|
66
65
|
@backend.setter
|
67
|
-
def backend(self, value: Optional[pulumi.Input[
|
66
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
68
67
|
pulumi.set(self, "backend", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter(name="generateSigningKey")
|
72
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[
|
71
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
73
72
|
"""
|
74
73
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
75
74
|
"""
|
76
75
|
return pulumi.get(self, "generate_signing_key")
|
77
76
|
|
78
77
|
@generate_signing_key.setter
|
79
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[
|
78
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
80
79
|
pulumi.set(self, "generate_signing_key", value)
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter(name="keyBits")
|
84
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
83
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
85
84
|
"""
|
86
85
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
87
86
|
"""
|
88
87
|
return pulumi.get(self, "key_bits")
|
89
88
|
|
90
89
|
@key_bits.setter
|
91
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
90
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
92
91
|
pulumi.set(self, "key_bits", value)
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter(name="keyType")
|
96
|
-
def key_type(self) -> Optional[pulumi.Input[
|
95
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
97
96
|
"""
|
98
97
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
99
98
|
"""
|
100
99
|
return pulumi.get(self, "key_type")
|
101
100
|
|
102
101
|
@key_type.setter
|
103
|
-
def key_type(self, value: Optional[pulumi.Input[
|
102
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
104
103
|
pulumi.set(self, "key_type", value)
|
105
104
|
|
106
|
-
@property
|
105
|
+
@_builtins.property
|
107
106
|
@pulumi.getter
|
108
|
-
def namespace(self) -> Optional[pulumi.Input[
|
107
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
109
108
|
"""
|
110
109
|
The namespace to provision the resource in.
|
111
110
|
The value should not contain leading or trailing forward slashes.
|
@@ -115,56 +114,56 @@ class SecretBackendCaArgs:
|
|
115
114
|
return pulumi.get(self, "namespace")
|
116
115
|
|
117
116
|
@namespace.setter
|
118
|
-
def namespace(self, value: Optional[pulumi.Input[
|
117
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
119
118
|
pulumi.set(self, "namespace", value)
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter(name="privateKey")
|
123
|
-
def private_key(self) -> Optional[pulumi.Input[
|
122
|
+
def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
124
123
|
"""
|
125
124
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
126
125
|
"""
|
127
126
|
return pulumi.get(self, "private_key")
|
128
127
|
|
129
128
|
@private_key.setter
|
130
|
-
def private_key(self, value: Optional[pulumi.Input[
|
129
|
+
def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
131
130
|
pulumi.set(self, "private_key", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="publicKey")
|
135
|
-
def public_key(self) -> Optional[pulumi.Input[
|
134
|
+
def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
136
135
|
"""
|
137
136
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
138
137
|
"""
|
139
138
|
return pulumi.get(self, "public_key")
|
140
139
|
|
141
140
|
@public_key.setter
|
142
|
-
def public_key(self, value: Optional[pulumi.Input[
|
141
|
+
def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
142
|
pulumi.set(self, "public_key", value)
|
144
143
|
|
145
144
|
|
146
145
|
@pulumi.input_type
|
147
146
|
class _SecretBackendCaState:
|
148
147
|
def __init__(__self__, *,
|
149
|
-
backend: Optional[pulumi.Input[
|
150
|
-
generate_signing_key: Optional[pulumi.Input[
|
151
|
-
key_bits: Optional[pulumi.Input[
|
152
|
-
key_type: Optional[pulumi.Input[
|
153
|
-
namespace: Optional[pulumi.Input[
|
154
|
-
private_key: Optional[pulumi.Input[
|
155
|
-
public_key: Optional[pulumi.Input[
|
148
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
149
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
150
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
151
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
153
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
154
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None):
|
156
155
|
"""
|
157
156
|
Input properties used for looking up and filtering SecretBackendCa resources.
|
158
|
-
:param pulumi.Input[
|
159
|
-
:param pulumi.Input[
|
160
|
-
:param pulumi.Input[
|
161
|
-
:param pulumi.Input[
|
162
|
-
:param pulumi.Input[
|
157
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
158
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
159
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
160
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
161
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
163
162
|
The value should not contain leading or trailing forward slashes.
|
164
163
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
165
164
|
*Available only for Vault Enterprise*.
|
166
|
-
:param pulumi.Input[
|
167
|
-
:param pulumi.Input[
|
165
|
+
:param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
166
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
168
167
|
"""
|
169
168
|
if backend is not None:
|
170
169
|
pulumi.set(__self__, "backend", backend)
|
@@ -181,57 +180,57 @@ class _SecretBackendCaState:
|
|
181
180
|
if public_key is not None:
|
182
181
|
pulumi.set(__self__, "public_key", public_key)
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter
|
186
|
-
def backend(self) -> Optional[pulumi.Input[
|
185
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
187
186
|
"""
|
188
187
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
189
188
|
"""
|
190
189
|
return pulumi.get(self, "backend")
|
191
190
|
|
192
191
|
@backend.setter
|
193
|
-
def backend(self, value: Optional[pulumi.Input[
|
192
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
194
193
|
pulumi.set(self, "backend", value)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter(name="generateSigningKey")
|
198
|
-
def generate_signing_key(self) -> Optional[pulumi.Input[
|
197
|
+
def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
199
198
|
"""
|
200
199
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
201
200
|
"""
|
202
201
|
return pulumi.get(self, "generate_signing_key")
|
203
202
|
|
204
203
|
@generate_signing_key.setter
|
205
|
-
def generate_signing_key(self, value: Optional[pulumi.Input[
|
204
|
+
def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
206
205
|
pulumi.set(self, "generate_signing_key", value)
|
207
206
|
|
208
|
-
@property
|
207
|
+
@_builtins.property
|
209
208
|
@pulumi.getter(name="keyBits")
|
210
|
-
def key_bits(self) -> Optional[pulumi.Input[
|
209
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
211
210
|
"""
|
212
211
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
213
212
|
"""
|
214
213
|
return pulumi.get(self, "key_bits")
|
215
214
|
|
216
215
|
@key_bits.setter
|
217
|
-
def key_bits(self, value: Optional[pulumi.Input[
|
216
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
218
217
|
pulumi.set(self, "key_bits", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="keyType")
|
222
|
-
def key_type(self) -> Optional[pulumi.Input[
|
221
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
222
|
"""
|
224
223
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "key_type")
|
227
226
|
|
228
227
|
@key_type.setter
|
229
|
-
def key_type(self, value: Optional[pulumi.Input[
|
228
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
230
229
|
pulumi.set(self, "key_type", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter
|
234
|
-
def namespace(self) -> Optional[pulumi.Input[
|
233
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
235
234
|
"""
|
236
235
|
The namespace to provision the resource in.
|
237
236
|
The value should not contain leading or trailing forward slashes.
|
@@ -241,31 +240,31 @@ class _SecretBackendCaState:
|
|
241
240
|
return pulumi.get(self, "namespace")
|
242
241
|
|
243
242
|
@namespace.setter
|
244
|
-
def namespace(self, value: Optional[pulumi.Input[
|
243
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
245
244
|
pulumi.set(self, "namespace", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter(name="privateKey")
|
249
|
-
def private_key(self) -> Optional[pulumi.Input[
|
248
|
+
def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
249
|
"""
|
251
250
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
252
251
|
"""
|
253
252
|
return pulumi.get(self, "private_key")
|
254
253
|
|
255
254
|
@private_key.setter
|
256
|
-
def private_key(self, value: Optional[pulumi.Input[
|
255
|
+
def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
256
|
pulumi.set(self, "private_key", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter(name="publicKey")
|
261
|
-
def public_key(self) -> Optional[pulumi.Input[
|
260
|
+
def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
262
261
|
"""
|
263
262
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
264
263
|
"""
|
265
264
|
return pulumi.get(self, "public_key")
|
266
265
|
|
267
266
|
@public_key.setter
|
268
|
-
def public_key(self, value: Optional[pulumi.Input[
|
267
|
+
def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
269
268
|
pulumi.set(self, "public_key", value)
|
270
269
|
|
271
270
|
|
@@ -275,13 +274,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
275
274
|
def __init__(__self__,
|
276
275
|
resource_name: str,
|
277
276
|
opts: Optional[pulumi.ResourceOptions] = None,
|
278
|
-
backend: Optional[pulumi.Input[
|
279
|
-
generate_signing_key: Optional[pulumi.Input[
|
280
|
-
key_bits: Optional[pulumi.Input[
|
281
|
-
key_type: Optional[pulumi.Input[
|
282
|
-
namespace: Optional[pulumi.Input[
|
283
|
-
private_key: Optional[pulumi.Input[
|
284
|
-
public_key: Optional[pulumi.Input[
|
277
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
278
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
279
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
280
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
281
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
282
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
283
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
285
284
|
__props__=None):
|
286
285
|
"""
|
287
286
|
Provides a resource to manage CA information in an SSH secret backend
|
@@ -307,16 +306,16 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
307
306
|
|
308
307
|
:param str resource_name: The name of the resource.
|
309
308
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
310
|
-
:param pulumi.Input[
|
311
|
-
:param pulumi.Input[
|
312
|
-
:param pulumi.Input[
|
313
|
-
:param pulumi.Input[
|
314
|
-
:param pulumi.Input[
|
309
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
310
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
311
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
312
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
313
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
315
314
|
The value should not contain leading or trailing forward slashes.
|
316
315
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
317
316
|
*Available only for Vault Enterprise*.
|
318
|
-
:param pulumi.Input[
|
319
|
-
:param pulumi.Input[
|
317
|
+
:param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
318
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
320
319
|
"""
|
321
320
|
...
|
322
321
|
@overload
|
@@ -361,13 +360,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
361
360
|
def _internal_init(__self__,
|
362
361
|
resource_name: str,
|
363
362
|
opts: Optional[pulumi.ResourceOptions] = None,
|
364
|
-
backend: Optional[pulumi.Input[
|
365
|
-
generate_signing_key: Optional[pulumi.Input[
|
366
|
-
key_bits: Optional[pulumi.Input[
|
367
|
-
key_type: Optional[pulumi.Input[
|
368
|
-
namespace: Optional[pulumi.Input[
|
369
|
-
private_key: Optional[pulumi.Input[
|
370
|
-
public_key: Optional[pulumi.Input[
|
363
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
364
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
365
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
366
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
367
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
368
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
369
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
371
370
|
__props__=None):
|
372
371
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
373
372
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -396,13 +395,13 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
396
395
|
def get(resource_name: str,
|
397
396
|
id: pulumi.Input[str],
|
398
397
|
opts: Optional[pulumi.ResourceOptions] = None,
|
399
|
-
backend: Optional[pulumi.Input[
|
400
|
-
generate_signing_key: Optional[pulumi.Input[
|
401
|
-
key_bits: Optional[pulumi.Input[
|
402
|
-
key_type: Optional[pulumi.Input[
|
403
|
-
namespace: Optional[pulumi.Input[
|
404
|
-
private_key: Optional[pulumi.Input[
|
405
|
-
public_key: Optional[pulumi.Input[
|
398
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
399
|
+
generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
|
400
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
401
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
402
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
403
|
+
private_key: Optional[pulumi.Input[_builtins.str]] = None,
|
404
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendCa':
|
406
405
|
"""
|
407
406
|
Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
|
408
407
|
properties used to qualify the lookup.
|
@@ -410,16 +409,16 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
410
409
|
:param str resource_name: The unique name of the resulting resource.
|
411
410
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
412
411
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
413
|
-
:param pulumi.Input[
|
414
|
-
:param pulumi.Input[
|
415
|
-
:param pulumi.Input[
|
416
|
-
:param pulumi.Input[
|
417
|
-
:param pulumi.Input[
|
412
|
+
:param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
413
|
+
:param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
414
|
+
:param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
415
|
+
:param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
416
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
418
417
|
The value should not contain leading or trailing forward slashes.
|
419
418
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
420
419
|
*Available only for Vault Enterprise*.
|
421
|
-
:param pulumi.Input[
|
422
|
-
:param pulumi.Input[
|
420
|
+
:param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
|
421
|
+
:param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
|
423
422
|
"""
|
424
423
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
425
424
|
|
@@ -434,41 +433,41 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
434
433
|
__props__.__dict__["public_key"] = public_key
|
435
434
|
return SecretBackendCa(resource_name, opts=opts, __props__=__props__)
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter
|
439
|
-
def backend(self) -> pulumi.Output[Optional[
|
438
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
440
439
|
"""
|
441
440
|
The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
442
441
|
"""
|
443
442
|
return pulumi.get(self, "backend")
|
444
443
|
|
445
|
-
@property
|
444
|
+
@_builtins.property
|
446
445
|
@pulumi.getter(name="generateSigningKey")
|
447
|
-
def generate_signing_key(self) -> pulumi.Output[Optional[
|
446
|
+
def generate_signing_key(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
448
447
|
"""
|
449
448
|
Whether Vault should generate the signing key pair internally. Defaults to true
|
450
449
|
"""
|
451
450
|
return pulumi.get(self, "generate_signing_key")
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter(name="keyBits")
|
455
|
-
def key_bits(self) -> pulumi.Output[Optional[
|
454
|
+
def key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
|
456
455
|
"""
|
457
456
|
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
458
457
|
"""
|
459
458
|
return pulumi.get(self, "key_bits")
|
460
459
|
|
461
|
-
@property
|
460
|
+
@_builtins.property
|
462
461
|
@pulumi.getter(name="keyType")
|
463
|
-
def key_type(self) -> pulumi.Output[Optional[
|
462
|
+
def key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
464
463
|
"""
|
465
464
|
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
466
465
|
"""
|
467
466
|
return pulumi.get(self, "key_type")
|
468
467
|
|
469
|
-
@property
|
468
|
+
@_builtins.property
|
470
469
|
@pulumi.getter
|
471
|
-
def namespace(self) -> pulumi.Output[Optional[
|
470
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
472
471
|
"""
|
473
472
|
The namespace to provision the resource in.
|
474
473
|
The value should not contain leading or trailing forward slashes.
|
@@ -477,17 +476,17 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
477
476
|
"""
|
478
477
|
return pulumi.get(self, "namespace")
|
479
478
|
|
480
|
-
@property
|
479
|
+
@_builtins.property
|
481
480
|
@pulumi.getter(name="privateKey")
|
482
|
-
def private_key(self) -> pulumi.Output[
|
481
|
+
def private_key(self) -> pulumi.Output[_builtins.str]:
|
483
482
|
"""
|
484
483
|
Private key part the SSH CA key pair; required if generate_signing_key is false.
|
485
484
|
"""
|
486
485
|
return pulumi.get(self, "private_key")
|
487
486
|
|
488
|
-
@property
|
487
|
+
@_builtins.property
|
489
488
|
@pulumi.getter(name="publicKey")
|
490
|
-
def public_key(self) -> pulumi.Output[
|
489
|
+
def public_key(self) -> pulumi.Output[_builtins.str]:
|
491
490
|
"""
|
492
491
|
The public key part the SSH CA key pair; required if generate_signing_key is false.
|
493
492
|
"""
|