pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,395 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetBackendIssuerResult',
|
|
19
|
+
'AwaitableGetBackendIssuerResult',
|
|
20
|
+
'get_backend_issuer',
|
|
21
|
+
'get_backend_issuer_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetBackendIssuerResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getBackendIssuer.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, ca_chains=None, certificate=None, disable_critical_extension_checks=None, disable_name_checks=None, disable_name_constraint_checks=None, disable_path_length_checks=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if ca_chains and not isinstance(ca_chains, list):
|
|
34
|
+
raise TypeError("Expected argument 'ca_chains' to be a list")
|
|
35
|
+
pulumi.set(__self__, "ca_chains", ca_chains)
|
|
36
|
+
if certificate and not isinstance(certificate, str):
|
|
37
|
+
raise TypeError("Expected argument 'certificate' to be a str")
|
|
38
|
+
pulumi.set(__self__, "certificate", certificate)
|
|
39
|
+
if disable_critical_extension_checks and not isinstance(disable_critical_extension_checks, bool):
|
|
40
|
+
raise TypeError("Expected argument 'disable_critical_extension_checks' to be a bool")
|
|
41
|
+
pulumi.set(__self__, "disable_critical_extension_checks", disable_critical_extension_checks)
|
|
42
|
+
if disable_name_checks and not isinstance(disable_name_checks, bool):
|
|
43
|
+
raise TypeError("Expected argument 'disable_name_checks' to be a bool")
|
|
44
|
+
pulumi.set(__self__, "disable_name_checks", disable_name_checks)
|
|
45
|
+
if disable_name_constraint_checks and not isinstance(disable_name_constraint_checks, bool):
|
|
46
|
+
raise TypeError("Expected argument 'disable_name_constraint_checks' to be a bool")
|
|
47
|
+
pulumi.set(__self__, "disable_name_constraint_checks", disable_name_constraint_checks)
|
|
48
|
+
if disable_path_length_checks and not isinstance(disable_path_length_checks, bool):
|
|
49
|
+
raise TypeError("Expected argument 'disable_path_length_checks' to be a bool")
|
|
50
|
+
pulumi.set(__self__, "disable_path_length_checks", disable_path_length_checks)
|
|
51
|
+
if id and not isinstance(id, str):
|
|
52
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
53
|
+
pulumi.set(__self__, "id", id)
|
|
54
|
+
if issuer_id and not isinstance(issuer_id, str):
|
|
55
|
+
raise TypeError("Expected argument 'issuer_id' to be a str")
|
|
56
|
+
pulumi.set(__self__, "issuer_id", issuer_id)
|
|
57
|
+
if issuer_name and not isinstance(issuer_name, str):
|
|
58
|
+
raise TypeError("Expected argument 'issuer_name' to be a str")
|
|
59
|
+
pulumi.set(__self__, "issuer_name", issuer_name)
|
|
60
|
+
if issuer_ref and not isinstance(issuer_ref, str):
|
|
61
|
+
raise TypeError("Expected argument 'issuer_ref' to be a str")
|
|
62
|
+
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
|
63
|
+
if key_id and not isinstance(key_id, str):
|
|
64
|
+
raise TypeError("Expected argument 'key_id' to be a str")
|
|
65
|
+
pulumi.set(__self__, "key_id", key_id)
|
|
66
|
+
if leaf_not_after_behavior and not isinstance(leaf_not_after_behavior, str):
|
|
67
|
+
raise TypeError("Expected argument 'leaf_not_after_behavior' to be a str")
|
|
68
|
+
pulumi.set(__self__, "leaf_not_after_behavior", leaf_not_after_behavior)
|
|
69
|
+
if manual_chains and not isinstance(manual_chains, list):
|
|
70
|
+
raise TypeError("Expected argument 'manual_chains' to be a list")
|
|
71
|
+
pulumi.set(__self__, "manual_chains", manual_chains)
|
|
72
|
+
if namespace and not isinstance(namespace, str):
|
|
73
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
74
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
75
|
+
if usage and not isinstance(usage, str):
|
|
76
|
+
raise TypeError("Expected argument 'usage' to be a str")
|
|
77
|
+
pulumi.set(__self__, "usage", usage)
|
|
78
|
+
|
|
79
|
+
@_builtins.property
|
|
80
|
+
@pulumi.getter
|
|
81
|
+
def backend(self) -> _builtins.str:
|
|
82
|
+
return pulumi.get(self, "backend")
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
@pulumi.getter(name="caChains")
|
|
86
|
+
def ca_chains(self) -> Sequence[_builtins.str]:
|
|
87
|
+
"""
|
|
88
|
+
The CA chain as a list of format specific certificates.
|
|
89
|
+
"""
|
|
90
|
+
return pulumi.get(self, "ca_chains")
|
|
91
|
+
|
|
92
|
+
@_builtins.property
|
|
93
|
+
@pulumi.getter
|
|
94
|
+
def certificate(self) -> _builtins.str:
|
|
95
|
+
"""
|
|
96
|
+
Certificate associated with this issuer.
|
|
97
|
+
"""
|
|
98
|
+
return pulumi.get(self, "certificate")
|
|
99
|
+
|
|
100
|
+
@_builtins.property
|
|
101
|
+
@pulumi.getter(name="disableCriticalExtensionChecks")
|
|
102
|
+
def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
|
|
103
|
+
"""
|
|
104
|
+
This determines whether this
|
|
105
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
106
|
+
issued certificate) contain critical extensions not processed by Vault.
|
|
107
|
+
"""
|
|
108
|
+
return pulumi.get(self, "disable_critical_extension_checks")
|
|
109
|
+
|
|
110
|
+
@_builtins.property
|
|
111
|
+
@pulumi.getter(name="disableNameChecks")
|
|
112
|
+
def disable_name_checks(self) -> Optional[_builtins.bool]:
|
|
113
|
+
"""
|
|
114
|
+
This determines whether this issuer is able
|
|
115
|
+
to issue certificates where the chain of trust (including the final issued
|
|
116
|
+
certificate) contains a link in which the subject of the issuing certificate
|
|
117
|
+
does not match the named issuer of the certificate it signed.
|
|
118
|
+
"""
|
|
119
|
+
return pulumi.get(self, "disable_name_checks")
|
|
120
|
+
|
|
121
|
+
@_builtins.property
|
|
122
|
+
@pulumi.getter(name="disableNameConstraintChecks")
|
|
123
|
+
def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
|
|
124
|
+
"""
|
|
125
|
+
This determines whether this
|
|
126
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
127
|
+
final issued certificate) violates the name constraints critical extension of
|
|
128
|
+
one of the issuer certificates in the chain.
|
|
129
|
+
"""
|
|
130
|
+
return pulumi.get(self, "disable_name_constraint_checks")
|
|
131
|
+
|
|
132
|
+
@_builtins.property
|
|
133
|
+
@pulumi.getter(name="disablePathLengthChecks")
|
|
134
|
+
def disable_path_length_checks(self) -> Optional[_builtins.bool]:
|
|
135
|
+
"""
|
|
136
|
+
This determines whether this issuer
|
|
137
|
+
is able to issue certificates where the chain of trust (including the final
|
|
138
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
|
139
|
+
chain.
|
|
140
|
+
"""
|
|
141
|
+
return pulumi.get(self, "disable_path_length_checks")
|
|
142
|
+
|
|
143
|
+
@_builtins.property
|
|
144
|
+
@pulumi.getter
|
|
145
|
+
def id(self) -> _builtins.str:
|
|
146
|
+
"""
|
|
147
|
+
The provider-assigned unique ID for this managed resource.
|
|
148
|
+
"""
|
|
149
|
+
return pulumi.get(self, "id")
|
|
150
|
+
|
|
151
|
+
@_builtins.property
|
|
152
|
+
@pulumi.getter(name="issuerId")
|
|
153
|
+
def issuer_id(self) -> _builtins.str:
|
|
154
|
+
"""
|
|
155
|
+
ID of the issuer.
|
|
156
|
+
"""
|
|
157
|
+
return pulumi.get(self, "issuer_id")
|
|
158
|
+
|
|
159
|
+
@_builtins.property
|
|
160
|
+
@pulumi.getter(name="issuerName")
|
|
161
|
+
def issuer_name(self) -> _builtins.str:
|
|
162
|
+
"""
|
|
163
|
+
Name of the issuer.
|
|
164
|
+
"""
|
|
165
|
+
return pulumi.get(self, "issuer_name")
|
|
166
|
+
|
|
167
|
+
@_builtins.property
|
|
168
|
+
@pulumi.getter(name="issuerRef")
|
|
169
|
+
def issuer_ref(self) -> _builtins.str:
|
|
170
|
+
return pulumi.get(self, "issuer_ref")
|
|
171
|
+
|
|
172
|
+
@_builtins.property
|
|
173
|
+
@pulumi.getter(name="keyId")
|
|
174
|
+
def key_id(self) -> _builtins.str:
|
|
175
|
+
"""
|
|
176
|
+
ID of the key used by the issuer.
|
|
177
|
+
"""
|
|
178
|
+
return pulumi.get(self, "key_id")
|
|
179
|
+
|
|
180
|
+
@_builtins.property
|
|
181
|
+
@pulumi.getter(name="leafNotAfterBehavior")
|
|
182
|
+
def leaf_not_after_behavior(self) -> _builtins.str:
|
|
183
|
+
"""
|
|
184
|
+
Behavior of a leaf's NotAfter field during issuance.
|
|
185
|
+
"""
|
|
186
|
+
return pulumi.get(self, "leaf_not_after_behavior")
|
|
187
|
+
|
|
188
|
+
@_builtins.property
|
|
189
|
+
@pulumi.getter(name="manualChains")
|
|
190
|
+
def manual_chains(self) -> Sequence[_builtins.str]:
|
|
191
|
+
"""
|
|
192
|
+
Chain of issuer references to build this issuer's computed
|
|
193
|
+
CAChain field from, when non-empty.
|
|
194
|
+
"""
|
|
195
|
+
return pulumi.get(self, "manual_chains")
|
|
196
|
+
|
|
197
|
+
@_builtins.property
|
|
198
|
+
@pulumi.getter
|
|
199
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
200
|
+
return pulumi.get(self, "namespace")
|
|
201
|
+
|
|
202
|
+
@_builtins.property
|
|
203
|
+
@pulumi.getter
|
|
204
|
+
def usage(self) -> _builtins.str:
|
|
205
|
+
"""
|
|
206
|
+
Allowed usages for this issuer.
|
|
207
|
+
"""
|
|
208
|
+
return pulumi.get(self, "usage")
|
|
209
|
+
|
|
210
|
+
|
|
211
|
+
class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
212
|
+
# pylint: disable=using-constant-test
|
|
213
|
+
def __await__(self):
|
|
214
|
+
if False:
|
|
215
|
+
yield self
|
|
216
|
+
return GetBackendIssuerResult(
|
|
217
|
+
backend=self.backend,
|
|
218
|
+
ca_chains=self.ca_chains,
|
|
219
|
+
certificate=self.certificate,
|
|
220
|
+
disable_critical_extension_checks=self.disable_critical_extension_checks,
|
|
221
|
+
disable_name_checks=self.disable_name_checks,
|
|
222
|
+
disable_name_constraint_checks=self.disable_name_constraint_checks,
|
|
223
|
+
disable_path_length_checks=self.disable_path_length_checks,
|
|
224
|
+
id=self.id,
|
|
225
|
+
issuer_id=self.issuer_id,
|
|
226
|
+
issuer_name=self.issuer_name,
|
|
227
|
+
issuer_ref=self.issuer_ref,
|
|
228
|
+
key_id=self.key_id,
|
|
229
|
+
leaf_not_after_behavior=self.leaf_not_after_behavior,
|
|
230
|
+
manual_chains=self.manual_chains,
|
|
231
|
+
namespace=self.namespace,
|
|
232
|
+
usage=self.usage)
|
|
233
|
+
|
|
234
|
+
|
|
235
|
+
def get_backend_issuer(backend: Optional[_builtins.str] = None,
|
|
236
|
+
disable_critical_extension_checks: Optional[_builtins.bool] = None,
|
|
237
|
+
disable_name_checks: Optional[_builtins.bool] = None,
|
|
238
|
+
disable_name_constraint_checks: Optional[_builtins.bool] = None,
|
|
239
|
+
disable_path_length_checks: Optional[_builtins.bool] = None,
|
|
240
|
+
issuer_ref: Optional[_builtins.str] = None,
|
|
241
|
+
namespace: Optional[_builtins.str] = None,
|
|
242
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
|
243
|
+
"""
|
|
244
|
+
## Example Usage
|
|
245
|
+
|
|
246
|
+
```python
|
|
247
|
+
import pulumi
|
|
248
|
+
import pulumi_vault as vault
|
|
249
|
+
|
|
250
|
+
pki = vault.Mount("pki",
|
|
251
|
+
path="pki",
|
|
252
|
+
type="pki",
|
|
253
|
+
description="PKI secret engine mount")
|
|
254
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
255
|
+
backend=pki.path,
|
|
256
|
+
type="internal",
|
|
257
|
+
common_name="example",
|
|
258
|
+
ttl="86400",
|
|
259
|
+
issuer_name="example")
|
|
260
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
|
261
|
+
issuer_ref=issuer_id))
|
|
262
|
+
```
|
|
263
|
+
|
|
264
|
+
|
|
265
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
266
|
+
read the issuer from, with no leading or trailing `/`s.
|
|
267
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
|
268
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
269
|
+
issued certificate) contain critical extensions not processed by Vault.
|
|
270
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
|
271
|
+
to issue certificates where the chain of trust (including the final issued
|
|
272
|
+
certificate) contains a link in which the subject of the issuing certificate
|
|
273
|
+
does not match the named issuer of the certificate it signed.
|
|
274
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
|
275
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
276
|
+
final issued certificate) violates the name constraints critical extension of
|
|
277
|
+
one of the issuer certificates in the chain.
|
|
278
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
|
279
|
+
is able to issue certificates where the chain of trust (including the final
|
|
280
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
|
281
|
+
chain.
|
|
282
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
|
283
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
284
|
+
The value should not contain leading or trailing forward slashes.
|
|
285
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
286
|
+
*Available only for Vault Enterprise*.
|
|
287
|
+
"""
|
|
288
|
+
__args__ = dict()
|
|
289
|
+
__args__['backend'] = backend
|
|
290
|
+
__args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
|
|
291
|
+
__args__['disableNameChecks'] = disable_name_checks
|
|
292
|
+
__args__['disableNameConstraintChecks'] = disable_name_constraint_checks
|
|
293
|
+
__args__['disablePathLengthChecks'] = disable_path_length_checks
|
|
294
|
+
__args__['issuerRef'] = issuer_ref
|
|
295
|
+
__args__['namespace'] = namespace
|
|
296
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
297
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult).value
|
|
298
|
+
|
|
299
|
+
return AwaitableGetBackendIssuerResult(
|
|
300
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
301
|
+
ca_chains=pulumi.get(__ret__, 'ca_chains'),
|
|
302
|
+
certificate=pulumi.get(__ret__, 'certificate'),
|
|
303
|
+
disable_critical_extension_checks=pulumi.get(__ret__, 'disable_critical_extension_checks'),
|
|
304
|
+
disable_name_checks=pulumi.get(__ret__, 'disable_name_checks'),
|
|
305
|
+
disable_name_constraint_checks=pulumi.get(__ret__, 'disable_name_constraint_checks'),
|
|
306
|
+
disable_path_length_checks=pulumi.get(__ret__, 'disable_path_length_checks'),
|
|
307
|
+
id=pulumi.get(__ret__, 'id'),
|
|
308
|
+
issuer_id=pulumi.get(__ret__, 'issuer_id'),
|
|
309
|
+
issuer_name=pulumi.get(__ret__, 'issuer_name'),
|
|
310
|
+
issuer_ref=pulumi.get(__ret__, 'issuer_ref'),
|
|
311
|
+
key_id=pulumi.get(__ret__, 'key_id'),
|
|
312
|
+
leaf_not_after_behavior=pulumi.get(__ret__, 'leaf_not_after_behavior'),
|
|
313
|
+
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
|
314
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
315
|
+
usage=pulumi.get(__ret__, 'usage'))
|
|
316
|
+
def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
317
|
+
disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
318
|
+
disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
319
|
+
disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
320
|
+
disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
321
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
322
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
323
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
|
324
|
+
"""
|
|
325
|
+
## Example Usage
|
|
326
|
+
|
|
327
|
+
```python
|
|
328
|
+
import pulumi
|
|
329
|
+
import pulumi_vault as vault
|
|
330
|
+
|
|
331
|
+
pki = vault.Mount("pki",
|
|
332
|
+
path="pki",
|
|
333
|
+
type="pki",
|
|
334
|
+
description="PKI secret engine mount")
|
|
335
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
336
|
+
backend=pki.path,
|
|
337
|
+
type="internal",
|
|
338
|
+
common_name="example",
|
|
339
|
+
ttl="86400",
|
|
340
|
+
issuer_name="example")
|
|
341
|
+
example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
|
|
342
|
+
issuer_ref=issuer_id))
|
|
343
|
+
```
|
|
344
|
+
|
|
345
|
+
|
|
346
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
347
|
+
read the issuer from, with no leading or trailing `/`s.
|
|
348
|
+
:param _builtins.bool disable_critical_extension_checks: This determines whether this
|
|
349
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
350
|
+
issued certificate) contain critical extensions not processed by Vault.
|
|
351
|
+
:param _builtins.bool disable_name_checks: This determines whether this issuer is able
|
|
352
|
+
to issue certificates where the chain of trust (including the final issued
|
|
353
|
+
certificate) contains a link in which the subject of the issuing certificate
|
|
354
|
+
does not match the named issuer of the certificate it signed.
|
|
355
|
+
:param _builtins.bool disable_name_constraint_checks: This determines whether this
|
|
356
|
+
issuer is able to issue certificates where the chain of trust (including the
|
|
357
|
+
final issued certificate) violates the name constraints critical extension of
|
|
358
|
+
one of the issuer certificates in the chain.
|
|
359
|
+
:param _builtins.bool disable_path_length_checks: This determines whether this issuer
|
|
360
|
+
is able to issue certificates where the chain of trust (including the final
|
|
361
|
+
issued certificate) is longer than allowed by a certificate authority in that
|
|
362
|
+
chain.
|
|
363
|
+
:param _builtins.str issuer_ref: Reference to an existing issuer.
|
|
364
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
365
|
+
The value should not contain leading or trailing forward slashes.
|
|
366
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
367
|
+
*Available only for Vault Enterprise*.
|
|
368
|
+
"""
|
|
369
|
+
__args__ = dict()
|
|
370
|
+
__args__['backend'] = backend
|
|
371
|
+
__args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
|
|
372
|
+
__args__['disableNameChecks'] = disable_name_checks
|
|
373
|
+
__args__['disableNameConstraintChecks'] = disable_name_constraint_checks
|
|
374
|
+
__args__['disablePathLengthChecks'] = disable_path_length_checks
|
|
375
|
+
__args__['issuerRef'] = issuer_ref
|
|
376
|
+
__args__['namespace'] = namespace
|
|
377
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
378
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
|
|
379
|
+
return __ret__.apply(lambda __response__: GetBackendIssuerResult(
|
|
380
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
381
|
+
ca_chains=pulumi.get(__response__, 'ca_chains'),
|
|
382
|
+
certificate=pulumi.get(__response__, 'certificate'),
|
|
383
|
+
disable_critical_extension_checks=pulumi.get(__response__, 'disable_critical_extension_checks'),
|
|
384
|
+
disable_name_checks=pulumi.get(__response__, 'disable_name_checks'),
|
|
385
|
+
disable_name_constraint_checks=pulumi.get(__response__, 'disable_name_constraint_checks'),
|
|
386
|
+
disable_path_length_checks=pulumi.get(__response__, 'disable_path_length_checks'),
|
|
387
|
+
id=pulumi.get(__response__, 'id'),
|
|
388
|
+
issuer_id=pulumi.get(__response__, 'issuer_id'),
|
|
389
|
+
issuer_name=pulumi.get(__response__, 'issuer_name'),
|
|
390
|
+
issuer_ref=pulumi.get(__response__, 'issuer_ref'),
|
|
391
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
|
392
|
+
leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
|
|
393
|
+
manual_chains=pulumi.get(__response__, 'manual_chains'),
|
|
394
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
395
|
+
usage=pulumi.get(__response__, 'usage')))
|
|
@@ -0,0 +1,192 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetBackendIssuersResult',
|
|
19
|
+
'AwaitableGetBackendIssuersResult',
|
|
20
|
+
'get_backend_issuers',
|
|
21
|
+
'get_backend_issuers_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetBackendIssuersResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getBackendIssuers.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, id=None, key_info=None, key_info_json=None, keys=None, namespace=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if id and not isinstance(id, str):
|
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
35
|
+
pulumi.set(__self__, "id", id)
|
|
36
|
+
if key_info and not isinstance(key_info, dict):
|
|
37
|
+
raise TypeError("Expected argument 'key_info' to be a dict")
|
|
38
|
+
pulumi.set(__self__, "key_info", key_info)
|
|
39
|
+
if key_info_json and not isinstance(key_info_json, str):
|
|
40
|
+
raise TypeError("Expected argument 'key_info_json' to be a str")
|
|
41
|
+
pulumi.set(__self__, "key_info_json", key_info_json)
|
|
42
|
+
if keys and not isinstance(keys, list):
|
|
43
|
+
raise TypeError("Expected argument 'keys' to be a list")
|
|
44
|
+
pulumi.set(__self__, "keys", keys)
|
|
45
|
+
if namespace and not isinstance(namespace, str):
|
|
46
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
47
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
48
|
+
|
|
49
|
+
@_builtins.property
|
|
50
|
+
@pulumi.getter
|
|
51
|
+
def backend(self) -> _builtins.str:
|
|
52
|
+
return pulumi.get(self, "backend")
|
|
53
|
+
|
|
54
|
+
@_builtins.property
|
|
55
|
+
@pulumi.getter
|
|
56
|
+
def id(self) -> _builtins.str:
|
|
57
|
+
"""
|
|
58
|
+
The provider-assigned unique ID for this managed resource.
|
|
59
|
+
"""
|
|
60
|
+
return pulumi.get(self, "id")
|
|
61
|
+
|
|
62
|
+
@_builtins.property
|
|
63
|
+
@pulumi.getter(name="keyInfo")
|
|
64
|
+
def key_info(self) -> Mapping[str, _builtins.str]:
|
|
65
|
+
"""
|
|
66
|
+
Map of issuer strings read from Vault.
|
|
67
|
+
"""
|
|
68
|
+
return pulumi.get(self, "key_info")
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
@pulumi.getter(name="keyInfoJson")
|
|
72
|
+
def key_info_json(self) -> _builtins.str:
|
|
73
|
+
"""
|
|
74
|
+
JSON-encoded issuer data read from Vault.
|
|
75
|
+
"""
|
|
76
|
+
return pulumi.get(self, "key_info_json")
|
|
77
|
+
|
|
78
|
+
@_builtins.property
|
|
79
|
+
@pulumi.getter
|
|
80
|
+
def keys(self) -> Sequence[_builtins.str]:
|
|
81
|
+
"""
|
|
82
|
+
Keys used by issuers under the backend path.
|
|
83
|
+
"""
|
|
84
|
+
return pulumi.get(self, "keys")
|
|
85
|
+
|
|
86
|
+
@_builtins.property
|
|
87
|
+
@pulumi.getter
|
|
88
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
89
|
+
return pulumi.get(self, "namespace")
|
|
90
|
+
|
|
91
|
+
|
|
92
|
+
class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
|
|
93
|
+
# pylint: disable=using-constant-test
|
|
94
|
+
def __await__(self):
|
|
95
|
+
if False:
|
|
96
|
+
yield self
|
|
97
|
+
return GetBackendIssuersResult(
|
|
98
|
+
backend=self.backend,
|
|
99
|
+
id=self.id,
|
|
100
|
+
key_info=self.key_info,
|
|
101
|
+
key_info_json=self.key_info_json,
|
|
102
|
+
keys=self.keys,
|
|
103
|
+
namespace=self.namespace)
|
|
104
|
+
|
|
105
|
+
|
|
106
|
+
def get_backend_issuers(backend: Optional[_builtins.str] = None,
|
|
107
|
+
namespace: Optional[_builtins.str] = None,
|
|
108
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
|
|
109
|
+
"""
|
|
110
|
+
## Example Usage
|
|
111
|
+
|
|
112
|
+
```python
|
|
113
|
+
import pulumi
|
|
114
|
+
import pulumi_vault as vault
|
|
115
|
+
|
|
116
|
+
pki = vault.Mount("pki",
|
|
117
|
+
path="pki",
|
|
118
|
+
type="pki",
|
|
119
|
+
description="PKI secret engine mount")
|
|
120
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
121
|
+
backend=pki.path,
|
|
122
|
+
type="internal",
|
|
123
|
+
common_name="example",
|
|
124
|
+
ttl="86400",
|
|
125
|
+
issuer_name="example")
|
|
126
|
+
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
|
127
|
+
```
|
|
128
|
+
|
|
129
|
+
|
|
130
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
131
|
+
read the issuers from, with no leading or trailing `/`s.
|
|
132
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
133
|
+
The value should not contain leading or trailing forward slashes.
|
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
135
|
+
*Available only for Vault Enterprise*.
|
|
136
|
+
"""
|
|
137
|
+
__args__ = dict()
|
|
138
|
+
__args__['backend'] = backend
|
|
139
|
+
__args__['namespace'] = namespace
|
|
140
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
141
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult).value
|
|
142
|
+
|
|
143
|
+
return AwaitableGetBackendIssuersResult(
|
|
144
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
145
|
+
id=pulumi.get(__ret__, 'id'),
|
|
146
|
+
key_info=pulumi.get(__ret__, 'key_info'),
|
|
147
|
+
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
|
148
|
+
keys=pulumi.get(__ret__, 'keys'),
|
|
149
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
|
150
|
+
def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
151
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
|
|
153
|
+
"""
|
|
154
|
+
## Example Usage
|
|
155
|
+
|
|
156
|
+
```python
|
|
157
|
+
import pulumi
|
|
158
|
+
import pulumi_vault as vault
|
|
159
|
+
|
|
160
|
+
pki = vault.Mount("pki",
|
|
161
|
+
path="pki",
|
|
162
|
+
type="pki",
|
|
163
|
+
description="PKI secret engine mount")
|
|
164
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
165
|
+
backend=pki.path,
|
|
166
|
+
type="internal",
|
|
167
|
+
common_name="example",
|
|
168
|
+
ttl="86400",
|
|
169
|
+
issuer_name="example")
|
|
170
|
+
test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
|
|
171
|
+
```
|
|
172
|
+
|
|
173
|
+
|
|
174
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
175
|
+
read the issuers from, with no leading or trailing `/`s.
|
|
176
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
177
|
+
The value should not contain leading or trailing forward slashes.
|
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
179
|
+
*Available only for Vault Enterprise*.
|
|
180
|
+
"""
|
|
181
|
+
__args__ = dict()
|
|
182
|
+
__args__['backend'] = backend
|
|
183
|
+
__args__['namespace'] = namespace
|
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
|
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendIssuersResult(
|
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|