pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,550 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['BackendAcmeEabArgs', 'BackendAcmeEab']
18
+
19
+ @pulumi.input_type
20
+ class BackendAcmeEabArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ role: Optional[pulumi.Input[_builtins.str]] = None):
26
+ """
27
+ The set of arguments for constructing a BackendAcmeEab resource.
28
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
29
+ create the EAB token within, with no leading or trailing `/`s.
30
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
32
+ The value should not contain leading or trailing forward slashes.
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
+ *Available only for Vault Enterprise*.
35
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
36
+
37
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
38
+
39
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
40
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
41
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
42
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
43
+ """
44
+ pulumi.set(__self__, "backend", backend)
45
+ if issuer is not None:
46
+ pulumi.set(__self__, "issuer", issuer)
47
+ if namespace is not None:
48
+ pulumi.set(__self__, "namespace", namespace)
49
+ if role is not None:
50
+ pulumi.set(__self__, "role", role)
51
+
52
+ @_builtins.property
53
+ @pulumi.getter
54
+ def backend(self) -> pulumi.Input[_builtins.str]:
55
+ """
56
+ The path to the PKI secret backend to
57
+ create the EAB token within, with no leading or trailing `/`s.
58
+ """
59
+ return pulumi.get(self, "backend")
60
+
61
+ @backend.setter
62
+ def backend(self, value: pulumi.Input[_builtins.str]):
63
+ pulumi.set(self, "backend", value)
64
+
65
+ @_builtins.property
66
+ @pulumi.getter
67
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
68
+ """
69
+ Create an EAB token that is specific to an issuer's ACME directory.
70
+ """
71
+ return pulumi.get(self, "issuer")
72
+
73
+ @issuer.setter
74
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
75
+ pulumi.set(self, "issuer", value)
76
+
77
+ @_builtins.property
78
+ @pulumi.getter
79
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
80
+ """
81
+ The namespace of the target resource.
82
+ The value should not contain leading or trailing forward slashes.
83
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
84
+ *Available only for Vault Enterprise*.
85
+ """
86
+ return pulumi.get(self, "namespace")
87
+
88
+ @namespace.setter
89
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
90
+ pulumi.set(self, "namespace", value)
91
+
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
95
+ """
96
+ Create an EAB token that is specific to a role's ACME directory.
97
+
98
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
99
+
100
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
101
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
102
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
103
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
104
+ """
105
+ return pulumi.get(self, "role")
106
+
107
+ @role.setter
108
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
109
+ pulumi.set(self, "role", value)
110
+
111
+
112
+ @pulumi.input_type
113
+ class _BackendAcmeEabState:
114
+ def __init__(__self__, *,
115
+ acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
116
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
117
+ created_on: Optional[pulumi.Input[_builtins.str]] = None,
118
+ eab_id: Optional[pulumi.Input[_builtins.str]] = None,
119
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
120
+ key: Optional[pulumi.Input[_builtins.str]] = None,
121
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
122
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
123
+ role: Optional[pulumi.Input[_builtins.str]] = None):
124
+ """
125
+ Input properties used for looking up and filtering BackendAcmeEab resources.
126
+ :param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
127
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
128
+ create the EAB token within, with no leading or trailing `/`s.
129
+ :param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
130
+ :param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
131
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
132
+ :param pulumi.Input[_builtins.str] key: The EAB token
133
+ :param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
134
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
135
+ The value should not contain leading or trailing forward slashes.
136
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
137
+ *Available only for Vault Enterprise*.
138
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
139
+
140
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
141
+
142
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
143
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
144
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
145
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
146
+ """
147
+ if acme_directory is not None:
148
+ pulumi.set(__self__, "acme_directory", acme_directory)
149
+ if backend is not None:
150
+ pulumi.set(__self__, "backend", backend)
151
+ if created_on is not None:
152
+ pulumi.set(__self__, "created_on", created_on)
153
+ if eab_id is not None:
154
+ pulumi.set(__self__, "eab_id", eab_id)
155
+ if issuer is not None:
156
+ pulumi.set(__self__, "issuer", issuer)
157
+ if key is not None:
158
+ pulumi.set(__self__, "key", key)
159
+ if key_type is not None:
160
+ pulumi.set(__self__, "key_type", key_type)
161
+ if namespace is not None:
162
+ pulumi.set(__self__, "namespace", namespace)
163
+ if role is not None:
164
+ pulumi.set(__self__, "role", role)
165
+
166
+ @_builtins.property
167
+ @pulumi.getter(name="acmeDirectory")
168
+ def acme_directory(self) -> Optional[pulumi.Input[_builtins.str]]:
169
+ """
170
+ The ACME directory to which the key belongs
171
+ """
172
+ return pulumi.get(self, "acme_directory")
173
+
174
+ @acme_directory.setter
175
+ def acme_directory(self, value: Optional[pulumi.Input[_builtins.str]]):
176
+ pulumi.set(self, "acme_directory", value)
177
+
178
+ @_builtins.property
179
+ @pulumi.getter
180
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
181
+ """
182
+ The path to the PKI secret backend to
183
+ create the EAB token within, with no leading or trailing `/`s.
184
+ """
185
+ return pulumi.get(self, "backend")
186
+
187
+ @backend.setter
188
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
189
+ pulumi.set(self, "backend", value)
190
+
191
+ @_builtins.property
192
+ @pulumi.getter(name="createdOn")
193
+ def created_on(self) -> Optional[pulumi.Input[_builtins.str]]:
194
+ """
195
+ An RFC3339 formatted date time when the EAB token was created
196
+ """
197
+ return pulumi.get(self, "created_on")
198
+
199
+ @created_on.setter
200
+ def created_on(self, value: Optional[pulumi.Input[_builtins.str]]):
201
+ pulumi.set(self, "created_on", value)
202
+
203
+ @_builtins.property
204
+ @pulumi.getter(name="eabId")
205
+ def eab_id(self) -> Optional[pulumi.Input[_builtins.str]]:
206
+ """
207
+ The identifier of a specific ACME EAB token
208
+ """
209
+ return pulumi.get(self, "eab_id")
210
+
211
+ @eab_id.setter
212
+ def eab_id(self, value: Optional[pulumi.Input[_builtins.str]]):
213
+ pulumi.set(self, "eab_id", value)
214
+
215
+ @_builtins.property
216
+ @pulumi.getter
217
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
218
+ """
219
+ Create an EAB token that is specific to an issuer's ACME directory.
220
+ """
221
+ return pulumi.get(self, "issuer")
222
+
223
+ @issuer.setter
224
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
225
+ pulumi.set(self, "issuer", value)
226
+
227
+ @_builtins.property
228
+ @pulumi.getter
229
+ def key(self) -> Optional[pulumi.Input[_builtins.str]]:
230
+ """
231
+ The EAB token
232
+ """
233
+ return pulumi.get(self, "key")
234
+
235
+ @key.setter
236
+ def key(self, value: Optional[pulumi.Input[_builtins.str]]):
237
+ pulumi.set(self, "key", value)
238
+
239
+ @_builtins.property
240
+ @pulumi.getter(name="keyType")
241
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
242
+ """
243
+ The key type of the EAB key
244
+ """
245
+ return pulumi.get(self, "key_type")
246
+
247
+ @key_type.setter
248
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
249
+ pulumi.set(self, "key_type", value)
250
+
251
+ @_builtins.property
252
+ @pulumi.getter
253
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
254
+ """
255
+ The namespace of the target resource.
256
+ The value should not contain leading or trailing forward slashes.
257
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
258
+ *Available only for Vault Enterprise*.
259
+ """
260
+ return pulumi.get(self, "namespace")
261
+
262
+ @namespace.setter
263
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
264
+ pulumi.set(self, "namespace", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter
268
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
269
+ """
270
+ Create an EAB token that is specific to a role's ACME directory.
271
+
272
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
273
+
274
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
275
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
276
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
277
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
278
+ """
279
+ return pulumi.get(self, "role")
280
+
281
+ @role.setter
282
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
283
+ pulumi.set(self, "role", value)
284
+
285
+
286
+ @pulumi.type_token("vault:pkiSecret/backendAcmeEab:BackendAcmeEab")
287
+ class BackendAcmeEab(pulumi.CustomResource):
288
+ @overload
289
+ def __init__(__self__,
290
+ resource_name: str,
291
+ opts: Optional[pulumi.ResourceOptions] = None,
292
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
293
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
294
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
295
+ role: Optional[pulumi.Input[_builtins.str]] = None,
296
+ __props__=None):
297
+ """
298
+ Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
299
+
300
+ ## Example Usage
301
+
302
+ ```python
303
+ import pulumi
304
+ import pulumi_vault as vault
305
+
306
+ test = vault.Mount("test",
307
+ path="pki",
308
+ type="pki",
309
+ description="PKI secret engine mount")
310
+ test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
311
+ ```
312
+
313
+ ## Import
314
+
315
+ As EAB tokens are only available on initial creation there is no possibility to
316
+
317
+ import or update this resource.
318
+
319
+ :param str resource_name: The name of the resource.
320
+ :param pulumi.ResourceOptions opts: Options for the resource.
321
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
322
+ create the EAB token within, with no leading or trailing `/`s.
323
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
324
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
325
+ The value should not contain leading or trailing forward slashes.
326
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
327
+ *Available only for Vault Enterprise*.
328
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
329
+
330
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
331
+
332
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
333
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
334
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
335
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
336
+ """
337
+ ...
338
+ @overload
339
+ def __init__(__self__,
340
+ resource_name: str,
341
+ args: BackendAcmeEabArgs,
342
+ opts: Optional[pulumi.ResourceOptions] = None):
343
+ """
344
+ Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
345
+
346
+ ## Example Usage
347
+
348
+ ```python
349
+ import pulumi
350
+ import pulumi_vault as vault
351
+
352
+ test = vault.Mount("test",
353
+ path="pki",
354
+ type="pki",
355
+ description="PKI secret engine mount")
356
+ test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
357
+ ```
358
+
359
+ ## Import
360
+
361
+ As EAB tokens are only available on initial creation there is no possibility to
362
+
363
+ import or update this resource.
364
+
365
+ :param str resource_name: The name of the resource.
366
+ :param BackendAcmeEabArgs args: The arguments to use to populate this resource's properties.
367
+ :param pulumi.ResourceOptions opts: Options for the resource.
368
+ """
369
+ ...
370
+ def __init__(__self__, resource_name: str, *args, **kwargs):
371
+ resource_args, opts = _utilities.get_resource_args_opts(BackendAcmeEabArgs, pulumi.ResourceOptions, *args, **kwargs)
372
+ if resource_args is not None:
373
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
374
+ else:
375
+ __self__._internal_init(resource_name, *args, **kwargs)
376
+
377
+ def _internal_init(__self__,
378
+ resource_name: str,
379
+ opts: Optional[pulumi.ResourceOptions] = None,
380
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
381
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
382
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
383
+ role: Optional[pulumi.Input[_builtins.str]] = None,
384
+ __props__=None):
385
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
386
+ if not isinstance(opts, pulumi.ResourceOptions):
387
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
388
+ if opts.id is None:
389
+ if __props__ is not None:
390
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
391
+ __props__ = BackendAcmeEabArgs.__new__(BackendAcmeEabArgs)
392
+
393
+ if backend is None and not opts.urn:
394
+ raise TypeError("Missing required property 'backend'")
395
+ __props__.__dict__["backend"] = backend
396
+ __props__.__dict__["issuer"] = issuer
397
+ __props__.__dict__["namespace"] = namespace
398
+ __props__.__dict__["role"] = role
399
+ __props__.__dict__["acme_directory"] = None
400
+ __props__.__dict__["created_on"] = None
401
+ __props__.__dict__["eab_id"] = None
402
+ __props__.__dict__["key"] = None
403
+ __props__.__dict__["key_type"] = None
404
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["key"])
405
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
406
+ super(BackendAcmeEab, __self__).__init__(
407
+ 'vault:pkiSecret/backendAcmeEab:BackendAcmeEab',
408
+ resource_name,
409
+ __props__,
410
+ opts)
411
+
412
+ @staticmethod
413
+ def get(resource_name: str,
414
+ id: pulumi.Input[str],
415
+ opts: Optional[pulumi.ResourceOptions] = None,
416
+ acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
417
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
418
+ created_on: Optional[pulumi.Input[_builtins.str]] = None,
419
+ eab_id: Optional[pulumi.Input[_builtins.str]] = None,
420
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
421
+ key: Optional[pulumi.Input[_builtins.str]] = None,
422
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
423
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
424
+ role: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendAcmeEab':
425
+ """
426
+ Get an existing BackendAcmeEab resource's state with the given name, id, and optional extra
427
+ properties used to qualify the lookup.
428
+
429
+ :param str resource_name: The unique name of the resulting resource.
430
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
431
+ :param pulumi.ResourceOptions opts: Options for the resource.
432
+ :param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
433
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
434
+ create the EAB token within, with no leading or trailing `/`s.
435
+ :param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
436
+ :param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
437
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
438
+ :param pulumi.Input[_builtins.str] key: The EAB token
439
+ :param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
440
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
441
+ The value should not contain leading or trailing forward slashes.
442
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
443
+ *Available only for Vault Enterprise*.
444
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
445
+
446
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
447
+
448
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
449
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
450
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
451
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
452
+ """
453
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
454
+
455
+ __props__ = _BackendAcmeEabState.__new__(_BackendAcmeEabState)
456
+
457
+ __props__.__dict__["acme_directory"] = acme_directory
458
+ __props__.__dict__["backend"] = backend
459
+ __props__.__dict__["created_on"] = created_on
460
+ __props__.__dict__["eab_id"] = eab_id
461
+ __props__.__dict__["issuer"] = issuer
462
+ __props__.__dict__["key"] = key
463
+ __props__.__dict__["key_type"] = key_type
464
+ __props__.__dict__["namespace"] = namespace
465
+ __props__.__dict__["role"] = role
466
+ return BackendAcmeEab(resource_name, opts=opts, __props__=__props__)
467
+
468
+ @_builtins.property
469
+ @pulumi.getter(name="acmeDirectory")
470
+ def acme_directory(self) -> pulumi.Output[_builtins.str]:
471
+ """
472
+ The ACME directory to which the key belongs
473
+ """
474
+ return pulumi.get(self, "acme_directory")
475
+
476
+ @_builtins.property
477
+ @pulumi.getter
478
+ def backend(self) -> pulumi.Output[_builtins.str]:
479
+ """
480
+ The path to the PKI secret backend to
481
+ create the EAB token within, with no leading or trailing `/`s.
482
+ """
483
+ return pulumi.get(self, "backend")
484
+
485
+ @_builtins.property
486
+ @pulumi.getter(name="createdOn")
487
+ def created_on(self) -> pulumi.Output[_builtins.str]:
488
+ """
489
+ An RFC3339 formatted date time when the EAB token was created
490
+ """
491
+ return pulumi.get(self, "created_on")
492
+
493
+ @_builtins.property
494
+ @pulumi.getter(name="eabId")
495
+ def eab_id(self) -> pulumi.Output[_builtins.str]:
496
+ """
497
+ The identifier of a specific ACME EAB token
498
+ """
499
+ return pulumi.get(self, "eab_id")
500
+
501
+ @_builtins.property
502
+ @pulumi.getter
503
+ def issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
504
+ """
505
+ Create an EAB token that is specific to an issuer's ACME directory.
506
+ """
507
+ return pulumi.get(self, "issuer")
508
+
509
+ @_builtins.property
510
+ @pulumi.getter
511
+ def key(self) -> pulumi.Output[_builtins.str]:
512
+ """
513
+ The EAB token
514
+ """
515
+ return pulumi.get(self, "key")
516
+
517
+ @_builtins.property
518
+ @pulumi.getter(name="keyType")
519
+ def key_type(self) -> pulumi.Output[_builtins.str]:
520
+ """
521
+ The key type of the EAB key
522
+ """
523
+ return pulumi.get(self, "key_type")
524
+
525
+ @_builtins.property
526
+ @pulumi.getter
527
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
528
+ """
529
+ The namespace of the target resource.
530
+ The value should not contain leading or trailing forward slashes.
531
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
532
+ *Available only for Vault Enterprise*.
533
+ """
534
+ return pulumi.get(self, "namespace")
535
+
536
+ @_builtins.property
537
+ @pulumi.getter
538
+ def role(self) -> pulumi.Output[Optional[_builtins.str]]:
539
+ """
540
+ Create an EAB token that is specific to a role's ACME directory.
541
+
542
+ **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
543
+
544
+ 1. Default directory (`pki/acme/`) - Do not specify a value for issuer nor role parameters.
545
+ 2. Issuer specific (`pki/issuer/:issuer_ref/acme/`) - Specify a value for the issuer parameter
546
+ 3. Role specific (`pki/roles/:role/acme/`) - Specify a value for the role parameter
547
+ 4. Issuer and Role specific (`pki/issuer/:issuer_ref/roles/:role/acme/`) - Specify a value for both the issuer and role parameters
548
+ """
549
+ return pulumi.get(self, "role")
550
+