pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,420 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendCertArgs', 'AuthBackendCert']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendCertArgs:
21
+ def __init__(__self__, *,
22
+ aws_public_cert: pulumi.Input[_builtins.str],
23
+ cert_name: pulumi.Input[_builtins.str],
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ type: Optional[pulumi.Input[_builtins.str]] = None):
27
+ """
28
+ The set of arguments for constructing a AuthBackendCert resource.
29
+ :param pulumi.Input[_builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
30
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
31
+ the [AWS
32
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
33
+ :param pulumi.Input[_builtins.str] cert_name: The name of the certificate.
34
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
35
+ mounted at. Defaults to `aws`.
36
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
+ The value should not contain leading or trailing forward slashes.
38
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
+ *Available only for Vault Enterprise*.
40
+ :param pulumi.Input[_builtins.str] type: Either "pkcs7" or "identity", indicating the type of
41
+ document which can be verified using the given certificate. Defaults to
42
+ "pkcs7".
43
+ """
44
+ pulumi.set(__self__, "aws_public_cert", aws_public_cert)
45
+ pulumi.set(__self__, "cert_name", cert_name)
46
+ if backend is not None:
47
+ pulumi.set(__self__, "backend", backend)
48
+ if namespace is not None:
49
+ pulumi.set(__self__, "namespace", namespace)
50
+ if type is not None:
51
+ pulumi.set(__self__, "type", type)
52
+
53
+ @_builtins.property
54
+ @pulumi.getter(name="awsPublicCert")
55
+ def aws_public_cert(self) -> pulumi.Input[_builtins.str]:
56
+ """
57
+ The Base64 encoded AWS Public key required to
58
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
59
+ the [AWS
60
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
61
+ """
62
+ return pulumi.get(self, "aws_public_cert")
63
+
64
+ @aws_public_cert.setter
65
+ def aws_public_cert(self, value: pulumi.Input[_builtins.str]):
66
+ pulumi.set(self, "aws_public_cert", value)
67
+
68
+ @_builtins.property
69
+ @pulumi.getter(name="certName")
70
+ def cert_name(self) -> pulumi.Input[_builtins.str]:
71
+ """
72
+ The name of the certificate.
73
+ """
74
+ return pulumi.get(self, "cert_name")
75
+
76
+ @cert_name.setter
77
+ def cert_name(self, value: pulumi.Input[_builtins.str]):
78
+ pulumi.set(self, "cert_name", value)
79
+
80
+ @_builtins.property
81
+ @pulumi.getter
82
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
83
+ """
84
+ The path the AWS auth backend being configured was
85
+ mounted at. Defaults to `aws`.
86
+ """
87
+ return pulumi.get(self, "backend")
88
+
89
+ @backend.setter
90
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
91
+ pulumi.set(self, "backend", value)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
96
+ """
97
+ The namespace to provision the resource in.
98
+ The value should not contain leading or trailing forward slashes.
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
100
+ *Available only for Vault Enterprise*.
101
+ """
102
+ return pulumi.get(self, "namespace")
103
+
104
+ @namespace.setter
105
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
106
+ pulumi.set(self, "namespace", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter
110
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
111
+ """
112
+ Either "pkcs7" or "identity", indicating the type of
113
+ document which can be verified using the given certificate. Defaults to
114
+ "pkcs7".
115
+ """
116
+ return pulumi.get(self, "type")
117
+
118
+ @type.setter
119
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
120
+ pulumi.set(self, "type", value)
121
+
122
+
123
+ @pulumi.input_type
124
+ class _AuthBackendCertState:
125
+ def __init__(__self__, *,
126
+ aws_public_cert: Optional[pulumi.Input[_builtins.str]] = None,
127
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
128
+ cert_name: Optional[pulumi.Input[_builtins.str]] = None,
129
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
130
+ type: Optional[pulumi.Input[_builtins.str]] = None):
131
+ """
132
+ Input properties used for looking up and filtering AuthBackendCert resources.
133
+ :param pulumi.Input[_builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
134
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
135
+ the [AWS
136
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
137
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
138
+ mounted at. Defaults to `aws`.
139
+ :param pulumi.Input[_builtins.str] cert_name: The name of the certificate.
140
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
141
+ The value should not contain leading or trailing forward slashes.
142
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
+ *Available only for Vault Enterprise*.
144
+ :param pulumi.Input[_builtins.str] type: Either "pkcs7" or "identity", indicating the type of
145
+ document which can be verified using the given certificate. Defaults to
146
+ "pkcs7".
147
+ """
148
+ if aws_public_cert is not None:
149
+ pulumi.set(__self__, "aws_public_cert", aws_public_cert)
150
+ if backend is not None:
151
+ pulumi.set(__self__, "backend", backend)
152
+ if cert_name is not None:
153
+ pulumi.set(__self__, "cert_name", cert_name)
154
+ if namespace is not None:
155
+ pulumi.set(__self__, "namespace", namespace)
156
+ if type is not None:
157
+ pulumi.set(__self__, "type", type)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="awsPublicCert")
161
+ def aws_public_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The Base64 encoded AWS Public key required to
164
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
165
+ the [AWS
166
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
167
+ """
168
+ return pulumi.get(self, "aws_public_cert")
169
+
170
+ @aws_public_cert.setter
171
+ def aws_public_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "aws_public_cert", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter
176
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
177
+ """
178
+ The path the AWS auth backend being configured was
179
+ mounted at. Defaults to `aws`.
180
+ """
181
+ return pulumi.get(self, "backend")
182
+
183
+ @backend.setter
184
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
185
+ pulumi.set(self, "backend", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter(name="certName")
189
+ def cert_name(self) -> Optional[pulumi.Input[_builtins.str]]:
190
+ """
191
+ The name of the certificate.
192
+ """
193
+ return pulumi.get(self, "cert_name")
194
+
195
+ @cert_name.setter
196
+ def cert_name(self, value: Optional[pulumi.Input[_builtins.str]]):
197
+ pulumi.set(self, "cert_name", value)
198
+
199
+ @_builtins.property
200
+ @pulumi.getter
201
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
202
+ """
203
+ The namespace to provision the resource in.
204
+ The value should not contain leading or trailing forward slashes.
205
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
206
+ *Available only for Vault Enterprise*.
207
+ """
208
+ return pulumi.get(self, "namespace")
209
+
210
+ @namespace.setter
211
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
212
+ pulumi.set(self, "namespace", value)
213
+
214
+ @_builtins.property
215
+ @pulumi.getter
216
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
217
+ """
218
+ Either "pkcs7" or "identity", indicating the type of
219
+ document which can be verified using the given certificate. Defaults to
220
+ "pkcs7".
221
+ """
222
+ return pulumi.get(self, "type")
223
+
224
+ @type.setter
225
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
226
+ pulumi.set(self, "type", value)
227
+
228
+
229
+ @pulumi.type_token("vault:aws/authBackendCert:AuthBackendCert")
230
+ class AuthBackendCert(pulumi.CustomResource):
231
+ @overload
232
+ def __init__(__self__,
233
+ resource_name: str,
234
+ opts: Optional[pulumi.ResourceOptions] = None,
235
+ aws_public_cert: Optional[pulumi.Input[_builtins.str]] = None,
236
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
237
+ cert_name: Optional[pulumi.Input[_builtins.str]] = None,
238
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
239
+ type: Optional[pulumi.Input[_builtins.str]] = None,
240
+ __props__=None):
241
+ """
242
+ ## Example Usage
243
+
244
+ ## Import
245
+
246
+ AWS auth backend certificates can be imported using `auth/`, the `backend` path, `/config/certificate/`, and the `cert_name` e.g.
247
+
248
+ ```sh
249
+ $ pulumi import vault:aws/authBackendCert:AuthBackendCert example auth/aws/config/certificate/my-cert
250
+ ```
251
+
252
+ :param str resource_name: The name of the resource.
253
+ :param pulumi.ResourceOptions opts: Options for the resource.
254
+ :param pulumi.Input[_builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
255
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
256
+ the [AWS
257
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
258
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
259
+ mounted at. Defaults to `aws`.
260
+ :param pulumi.Input[_builtins.str] cert_name: The name of the certificate.
261
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
262
+ The value should not contain leading or trailing forward slashes.
263
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
264
+ *Available only for Vault Enterprise*.
265
+ :param pulumi.Input[_builtins.str] type: Either "pkcs7" or "identity", indicating the type of
266
+ document which can be verified using the given certificate. Defaults to
267
+ "pkcs7".
268
+ """
269
+ ...
270
+ @overload
271
+ def __init__(__self__,
272
+ resource_name: str,
273
+ args: AuthBackendCertArgs,
274
+ opts: Optional[pulumi.ResourceOptions] = None):
275
+ """
276
+ ## Example Usage
277
+
278
+ ## Import
279
+
280
+ AWS auth backend certificates can be imported using `auth/`, the `backend` path, `/config/certificate/`, and the `cert_name` e.g.
281
+
282
+ ```sh
283
+ $ pulumi import vault:aws/authBackendCert:AuthBackendCert example auth/aws/config/certificate/my-cert
284
+ ```
285
+
286
+ :param str resource_name: The name of the resource.
287
+ :param AuthBackendCertArgs args: The arguments to use to populate this resource's properties.
288
+ :param pulumi.ResourceOptions opts: Options for the resource.
289
+ """
290
+ ...
291
+ def __init__(__self__, resource_name: str, *args, **kwargs):
292
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendCertArgs, pulumi.ResourceOptions, *args, **kwargs)
293
+ if resource_args is not None:
294
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
295
+ else:
296
+ __self__._internal_init(resource_name, *args, **kwargs)
297
+
298
+ def _internal_init(__self__,
299
+ resource_name: str,
300
+ opts: Optional[pulumi.ResourceOptions] = None,
301
+ aws_public_cert: Optional[pulumi.Input[_builtins.str]] = None,
302
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
303
+ cert_name: Optional[pulumi.Input[_builtins.str]] = None,
304
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
305
+ type: Optional[pulumi.Input[_builtins.str]] = None,
306
+ __props__=None):
307
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
308
+ if not isinstance(opts, pulumi.ResourceOptions):
309
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
310
+ if opts.id is None:
311
+ if __props__ is not None:
312
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
313
+ __props__ = AuthBackendCertArgs.__new__(AuthBackendCertArgs)
314
+
315
+ if aws_public_cert is None and not opts.urn:
316
+ raise TypeError("Missing required property 'aws_public_cert'")
317
+ __props__.__dict__["aws_public_cert"] = aws_public_cert
318
+ __props__.__dict__["backend"] = backend
319
+ if cert_name is None and not opts.urn:
320
+ raise TypeError("Missing required property 'cert_name'")
321
+ __props__.__dict__["cert_name"] = cert_name
322
+ __props__.__dict__["namespace"] = namespace
323
+ __props__.__dict__["type"] = type
324
+ super(AuthBackendCert, __self__).__init__(
325
+ 'vault:aws/authBackendCert:AuthBackendCert',
326
+ resource_name,
327
+ __props__,
328
+ opts)
329
+
330
+ @staticmethod
331
+ def get(resource_name: str,
332
+ id: pulumi.Input[str],
333
+ opts: Optional[pulumi.ResourceOptions] = None,
334
+ aws_public_cert: Optional[pulumi.Input[_builtins.str]] = None,
335
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
336
+ cert_name: Optional[pulumi.Input[_builtins.str]] = None,
337
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
338
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendCert':
339
+ """
340
+ Get an existing AuthBackendCert resource's state with the given name, id, and optional extra
341
+ properties used to qualify the lookup.
342
+
343
+ :param str resource_name: The unique name of the resulting resource.
344
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
345
+ :param pulumi.ResourceOptions opts: Options for the resource.
346
+ :param pulumi.Input[_builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
347
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
348
+ the [AWS
349
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
350
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
351
+ mounted at. Defaults to `aws`.
352
+ :param pulumi.Input[_builtins.str] cert_name: The name of the certificate.
353
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
354
+ The value should not contain leading or trailing forward slashes.
355
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
+ *Available only for Vault Enterprise*.
357
+ :param pulumi.Input[_builtins.str] type: Either "pkcs7" or "identity", indicating the type of
358
+ document which can be verified using the given certificate. Defaults to
359
+ "pkcs7".
360
+ """
361
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
362
+
363
+ __props__ = _AuthBackendCertState.__new__(_AuthBackendCertState)
364
+
365
+ __props__.__dict__["aws_public_cert"] = aws_public_cert
366
+ __props__.__dict__["backend"] = backend
367
+ __props__.__dict__["cert_name"] = cert_name
368
+ __props__.__dict__["namespace"] = namespace
369
+ __props__.__dict__["type"] = type
370
+ return AuthBackendCert(resource_name, opts=opts, __props__=__props__)
371
+
372
+ @_builtins.property
373
+ @pulumi.getter(name="awsPublicCert")
374
+ def aws_public_cert(self) -> pulumi.Output[_builtins.str]:
375
+ """
376
+ The Base64 encoded AWS Public key required to
377
+ verify PKCS7 signature of the EC2 instance metadata. You can find this key in
378
+ the [AWS
379
+ documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
380
+ """
381
+ return pulumi.get(self, "aws_public_cert")
382
+
383
+ @_builtins.property
384
+ @pulumi.getter
385
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
386
+ """
387
+ The path the AWS auth backend being configured was
388
+ mounted at. Defaults to `aws`.
389
+ """
390
+ return pulumi.get(self, "backend")
391
+
392
+ @_builtins.property
393
+ @pulumi.getter(name="certName")
394
+ def cert_name(self) -> pulumi.Output[_builtins.str]:
395
+ """
396
+ The name of the certificate.
397
+ """
398
+ return pulumi.get(self, "cert_name")
399
+
400
+ @_builtins.property
401
+ @pulumi.getter
402
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
403
+ """
404
+ The namespace to provision the resource in.
405
+ The value should not contain leading or trailing forward slashes.
406
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
407
+ *Available only for Vault Enterprise*.
408
+ """
409
+ return pulumi.get(self, "namespace")
410
+
411
+ @_builtins.property
412
+ @pulumi.getter
413
+ def type(self) -> pulumi.Output[Optional[_builtins.str]]:
414
+ """
415
+ Either "pkcs7" or "identity", indicating the type of
416
+ document which can be verified using the given certificate. Defaults to
417
+ "pkcs7".
418
+ """
419
+ return pulumi.get(self, "type")
420
+