pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,251 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigEstResult',
20
+ 'AwaitableGetBackendConfigEstResult',
21
+ 'get_backend_config_est',
22
+ 'get_backend_config_est_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigEstResult:
27
+ """
28
+ A collection of values returned by getBackendConfigEst.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_mount and not isinstance(default_mount, bool):
41
+ raise TypeError("Expected argument 'default_mount' to be a bool")
42
+ pulumi.set(__self__, "default_mount", default_mount)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if label_to_path_policy and not isinstance(label_to_path_policy, dict):
56
+ raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
57
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
58
+ if last_updated and not isinstance(last_updated, str):
59
+ raise TypeError("Expected argument 'last_updated' to be a str")
60
+ pulumi.set(__self__, "last_updated", last_updated)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @_builtins.property
66
+ @pulumi.getter(name="auditFields")
67
+ def audit_fields(self) -> Sequence[_builtins.str]:
68
+ """
69
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
+ """
71
+ return pulumi.get(self, "audit_fields")
72
+
73
+ @_builtins.property
74
+ @pulumi.getter
75
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
76
+ """
77
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
78
+ """
79
+ return pulumi.get(self, "authenticators")
80
+
81
+ @_builtins.property
82
+ @pulumi.getter
83
+ def backend(self) -> _builtins.str:
84
+ return pulumi.get(self, "backend")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter(name="defaultMount")
88
+ def default_mount(self) -> _builtins.bool:
89
+ """
90
+ If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
+ """
92
+ return pulumi.get(self, "default_mount")
93
+
94
+ @_builtins.property
95
+ @pulumi.getter(name="defaultPathPolicy")
96
+ def default_path_policy(self) -> _builtins.str:
97
+ """
98
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
+ """
100
+ return pulumi.get(self, "default_path_policy")
101
+
102
+ @_builtins.property
103
+ @pulumi.getter(name="enableSentinelParsing")
104
+ def enable_sentinel_parsing(self) -> _builtins.bool:
105
+ """
106
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
+ """
108
+ return pulumi.get(self, "enable_sentinel_parsing")
109
+
110
+ @_builtins.property
111
+ @pulumi.getter
112
+ def enabled(self) -> _builtins.bool:
113
+ """
114
+ Specifies whether EST is enabled.
115
+ """
116
+ return pulumi.get(self, "enabled")
117
+
118
+ @_builtins.property
119
+ @pulumi.getter
120
+ def id(self) -> _builtins.str:
121
+ """
122
+ The provider-assigned unique ID for this managed resource.
123
+ """
124
+ return pulumi.get(self, "id")
125
+
126
+ @_builtins.property
127
+ @pulumi.getter(name="labelToPathPolicy")
128
+ def label_to_path_policy(self) -> Mapping[str, _builtins.str]:
129
+ """
130
+ A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
+ """
132
+ return pulumi.get(self, "label_to_path_policy")
133
+
134
+ @_builtins.property
135
+ @pulumi.getter(name="lastUpdated")
136
+ def last_updated(self) -> _builtins.str:
137
+ """
138
+ A read-only timestamp representing the last time the configuration was updated.
139
+ """
140
+ return pulumi.get(self, "last_updated")
141
+
142
+ @_builtins.property
143
+ @pulumi.getter
144
+ def namespace(self) -> Optional[_builtins.str]:
145
+ return pulumi.get(self, "namespace")
146
+
147
+
148
+ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
149
+ # pylint: disable=using-constant-test
150
+ def __await__(self):
151
+ if False:
152
+ yield self
153
+ return GetBackendConfigEstResult(
154
+ audit_fields=self.audit_fields,
155
+ authenticators=self.authenticators,
156
+ backend=self.backend,
157
+ default_mount=self.default_mount,
158
+ default_path_policy=self.default_path_policy,
159
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
160
+ enabled=self.enabled,
161
+ id=self.id,
162
+ label_to_path_policy=self.label_to_path_policy,
163
+ last_updated=self.last_updated,
164
+ namespace=self.namespace)
165
+
166
+
167
+ def get_backend_config_est(backend: Optional[_builtins.str] = None,
168
+ namespace: Optional[_builtins.str] = None,
169
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
+ """
171
+ ## Example Usage
172
+
173
+ ```python
174
+ import pulumi
175
+ import pulumi_vault as vault
176
+
177
+ pki = vault.Mount("pki",
178
+ path="pki",
179
+ type="pki",
180
+ description="PKI secret engine mount")
181
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
182
+ ```
183
+
184
+
185
+ :param _builtins.str backend: The path to the PKI secret backend to
186
+ read the EST configuration from, with no leading or trailing `/`s.
187
+ :param _builtins.str namespace: The namespace of the target resource.
188
+ The value should not contain leading or trailing forward slashes.
189
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
+ *Available only for Vault Enterprise*.
191
+ """
192
+ __args__ = dict()
193
+ __args__['backend'] = backend
194
+ __args__['namespace'] = namespace
195
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
196
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
197
+
198
+ return AwaitableGetBackendConfigEstResult(
199
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
200
+ authenticators=pulumi.get(__ret__, 'authenticators'),
201
+ backend=pulumi.get(__ret__, 'backend'),
202
+ default_mount=pulumi.get(__ret__, 'default_mount'),
203
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
204
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
205
+ enabled=pulumi.get(__ret__, 'enabled'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
+ last_updated=pulumi.get(__ret__, 'last_updated'),
209
+ namespace=pulumi.get(__ret__, 'namespace'))
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
225
+ ```
226
+
227
+
228
+ :param _builtins.str backend: The path to the PKI secret backend to
229
+ read the EST configuration from, with no leading or trailing `/`s.
230
+ :param _builtins.str namespace: The namespace of the target resource.
231
+ The value should not contain leading or trailing forward slashes.
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
+ *Available only for Vault Enterprise*.
234
+ """
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -0,0 +1,271 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigScepResult',
20
+ 'AwaitableGetBackendConfigScepResult',
21
+ 'get_backend_config_scep',
22
+ 'get_backend_config_scep_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigScepResult:
27
+ """
28
+ A collection of values returned by getBackendConfigScep.
29
+ """
30
+ def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, log_level=None, namespace=None, restrict_ca_chain_to_issuer=None):
31
+ if allowed_digest_algorithms and not isinstance(allowed_digest_algorithms, list):
32
+ raise TypeError("Expected argument 'allowed_digest_algorithms' to be a list")
33
+ pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
34
+ if allowed_encryption_algorithms and not isinstance(allowed_encryption_algorithms, list):
35
+ raise TypeError("Expected argument 'allowed_encryption_algorithms' to be a list")
36
+ pulumi.set(__self__, "allowed_encryption_algorithms", allowed_encryption_algorithms)
37
+ if authenticators and not isinstance(authenticators, list):
38
+ raise TypeError("Expected argument 'authenticators' to be a list")
39
+ pulumi.set(__self__, "authenticators", authenticators)
40
+ if backend and not isinstance(backend, str):
41
+ raise TypeError("Expected argument 'backend' to be a str")
42
+ pulumi.set(__self__, "backend", backend)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enabled and not isinstance(enabled, bool):
47
+ raise TypeError("Expected argument 'enabled' to be a bool")
48
+ pulumi.set(__self__, "enabled", enabled)
49
+ if external_validations and not isinstance(external_validations, list):
50
+ raise TypeError("Expected argument 'external_validations' to be a list")
51
+ pulumi.set(__self__, "external_validations", external_validations)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if last_updated and not isinstance(last_updated, str):
56
+ raise TypeError("Expected argument 'last_updated' to be a str")
57
+ pulumi.set(__self__, "last_updated", last_updated)
58
+ if log_level and not isinstance(log_level, str):
59
+ raise TypeError("Expected argument 'log_level' to be a str")
60
+ pulumi.set(__self__, "log_level", log_level)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+ if restrict_ca_chain_to_issuer and not isinstance(restrict_ca_chain_to_issuer, bool):
65
+ raise TypeError("Expected argument 'restrict_ca_chain_to_issuer' to be a bool")
66
+ pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
67
+
68
+ @_builtins.property
69
+ @pulumi.getter(name="allowedDigestAlgorithms")
70
+ def allowed_digest_algorithms(self) -> Sequence[_builtins.str]:
71
+ """
72
+ List of allowed digest algorithms for SCEP requests.
73
+ """
74
+ return pulumi.get(self, "allowed_digest_algorithms")
75
+
76
+ @_builtins.property
77
+ @pulumi.getter(name="allowedEncryptionAlgorithms")
78
+ def allowed_encryption_algorithms(self) -> Sequence[_builtins.str]:
79
+ """
80
+ List of allowed encryption algorithms for SCEP requests.
81
+ """
82
+ return pulumi.get(self, "allowed_encryption_algorithms")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigScepAuthenticatorResult']:
87
+ """
88
+ Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
89
+ """
90
+ return pulumi.get(self, "authenticators")
91
+
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def backend(self) -> _builtins.str:
95
+ return pulumi.get(self, "backend")
96
+
97
+ @_builtins.property
98
+ @pulumi.getter(name="defaultPathPolicy")
99
+ def default_path_policy(self) -> _builtins.str:
100
+ """
101
+ Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
102
+ """
103
+ return pulumi.get(self, "default_path_policy")
104
+
105
+ @_builtins.property
106
+ @pulumi.getter
107
+ def enabled(self) -> _builtins.bool:
108
+ """
109
+ Specifies whether SCEP is enabled.
110
+ """
111
+ return pulumi.get(self, "enabled")
112
+
113
+ @_builtins.property
114
+ @pulumi.getter(name="externalValidations")
115
+ def external_validations(self) -> Sequence['outputs.GetBackendConfigScepExternalValidationResult']:
116
+ """
117
+ Lists the 3rd party validation of SCEP requests (see below for nested schema).
118
+ """
119
+ return pulumi.get(self, "external_validations")
120
+
121
+ @_builtins.property
122
+ @pulumi.getter
123
+ def id(self) -> _builtins.str:
124
+ """
125
+ The provider-assigned unique ID for this managed resource.
126
+ """
127
+ return pulumi.get(self, "id")
128
+
129
+ @_builtins.property
130
+ @pulumi.getter(name="lastUpdated")
131
+ def last_updated(self) -> _builtins.str:
132
+ """
133
+ A read-only timestamp representing the last time the configuration was updated.
134
+ """
135
+ return pulumi.get(self, "last_updated")
136
+
137
+ @_builtins.property
138
+ @pulumi.getter(name="logLevel")
139
+ def log_level(self) -> Optional[_builtins.str]:
140
+ """
141
+ The level of logging verbosity, affects only SCEP logs on this mount.
142
+ """
143
+ return pulumi.get(self, "log_level")
144
+
145
+ @_builtins.property
146
+ @pulumi.getter
147
+ def namespace(self) -> Optional[_builtins.str]:
148
+ return pulumi.get(self, "namespace")
149
+
150
+ @_builtins.property
151
+ @pulumi.getter(name="restrictCaChainToIssuer")
152
+ def restrict_ca_chain_to_issuer(self) -> _builtins.bool:
153
+ """
154
+ If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
155
+ """
156
+ return pulumi.get(self, "restrict_ca_chain_to_issuer")
157
+
158
+
159
+ class AwaitableGetBackendConfigScepResult(GetBackendConfigScepResult):
160
+ # pylint: disable=using-constant-test
161
+ def __await__(self):
162
+ if False:
163
+ yield self
164
+ return GetBackendConfigScepResult(
165
+ allowed_digest_algorithms=self.allowed_digest_algorithms,
166
+ allowed_encryption_algorithms=self.allowed_encryption_algorithms,
167
+ authenticators=self.authenticators,
168
+ backend=self.backend,
169
+ default_path_policy=self.default_path_policy,
170
+ enabled=self.enabled,
171
+ external_validations=self.external_validations,
172
+ id=self.id,
173
+ last_updated=self.last_updated,
174
+ log_level=self.log_level,
175
+ namespace=self.namespace,
176
+ restrict_ca_chain_to_issuer=self.restrict_ca_chain_to_issuer)
177
+
178
+
179
+ def get_backend_config_scep(backend: Optional[_builtins.str] = None,
180
+ log_level: Optional[_builtins.str] = None,
181
+ namespace: Optional[_builtins.str] = None,
182
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigScepResult:
183
+ """
184
+ ## Example Usage
185
+
186
+ ```python
187
+ import pulumi
188
+ import pulumi_vault as vault
189
+
190
+ pki = vault.Mount("pki",
191
+ path="pki",
192
+ type="pki",
193
+ description="PKI secret engine mount")
194
+ scep_config = vault.pkiSecret.get_backend_config_scep_output(backend=pki.path)
195
+ ```
196
+
197
+
198
+ :param _builtins.str backend: The path to the PKI secret backend to
199
+ read the SCEP configuration from, with no leading or trailing `/`s.
200
+ :param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
201
+ :param _builtins.str namespace: The namespace of the target resource.
202
+ The value should not contain leading or trailing forward slashes.
203
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
204
+ *Available only for Vault Enterprise*.
205
+ """
206
+ __args__ = dict()
207
+ __args__['backend'] = backend
208
+ __args__['logLevel'] = log_level
209
+ __args__['namespace'] = namespace
210
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
211
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult).value
212
+
213
+ return AwaitableGetBackendConfigScepResult(
214
+ allowed_digest_algorithms=pulumi.get(__ret__, 'allowed_digest_algorithms'),
215
+ allowed_encryption_algorithms=pulumi.get(__ret__, 'allowed_encryption_algorithms'),
216
+ authenticators=pulumi.get(__ret__, 'authenticators'),
217
+ backend=pulumi.get(__ret__, 'backend'),
218
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
219
+ enabled=pulumi.get(__ret__, 'enabled'),
220
+ external_validations=pulumi.get(__ret__, 'external_validations'),
221
+ id=pulumi.get(__ret__, 'id'),
222
+ last_updated=pulumi.get(__ret__, 'last_updated'),
223
+ log_level=pulumi.get(__ret__, 'log_level'),
224
+ namespace=pulumi.get(__ret__, 'namespace'),
225
+ restrict_ca_chain_to_issuer=pulumi.get(__ret__, 'restrict_ca_chain_to_issuer'))
226
+ def get_backend_config_scep_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
227
+ log_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
228
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
229
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigScepResult]:
230
+ """
231
+ ## Example Usage
232
+
233
+ ```python
234
+ import pulumi
235
+ import pulumi_vault as vault
236
+
237
+ pki = vault.Mount("pki",
238
+ path="pki",
239
+ type="pki",
240
+ description="PKI secret engine mount")
241
+ scep_config = vault.pkiSecret.get_backend_config_scep_output(backend=pki.path)
242
+ ```
243
+
244
+
245
+ :param _builtins.str backend: The path to the PKI secret backend to
246
+ read the SCEP configuration from, with no leading or trailing `/`s.
247
+ :param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
248
+ :param _builtins.str namespace: The namespace of the target resource.
249
+ The value should not contain leading or trailing forward slashes.
250
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
251
+ *Available only for Vault Enterprise*.
252
+ """
253
+ __args__ = dict()
254
+ __args__['backend'] = backend
255
+ __args__['logLevel'] = log_level
256
+ __args__['namespace'] = namespace
257
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
258
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult)
259
+ return __ret__.apply(lambda __response__: GetBackendConfigScepResult(
260
+ allowed_digest_algorithms=pulumi.get(__response__, 'allowed_digest_algorithms'),
261
+ allowed_encryption_algorithms=pulumi.get(__response__, 'allowed_encryption_algorithms'),
262
+ authenticators=pulumi.get(__response__, 'authenticators'),
263
+ backend=pulumi.get(__response__, 'backend'),
264
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
265
+ enabled=pulumi.get(__response__, 'enabled'),
266
+ external_validations=pulumi.get(__response__, 'external_validations'),
267
+ id=pulumi.get(__response__, 'id'),
268
+ last_updated=pulumi.get(__response__, 'last_updated'),
269
+ log_level=pulumi.get(__response__, 'log_level'),
270
+ namespace=pulumi.get(__response__, 'namespace'),
271
+ restrict_ca_chain_to_issuer=pulumi.get(__response__, 'restrict_ca_chain_to_issuer')))