pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,395 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetBackendIssuerResult',
19
+ 'AwaitableGetBackendIssuerResult',
20
+ 'get_backend_issuer',
21
+ 'get_backend_issuer_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetBackendIssuerResult:
26
+ """
27
+ A collection of values returned by getBackendIssuer.
28
+ """
29
+ def __init__(__self__, backend=None, ca_chains=None, certificate=None, disable_critical_extension_checks=None, disable_name_checks=None, disable_name_constraint_checks=None, disable_path_length_checks=None, id=None, issuer_id=None, issuer_name=None, issuer_ref=None, key_id=None, leaf_not_after_behavior=None, manual_chains=None, namespace=None, usage=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if ca_chains and not isinstance(ca_chains, list):
34
+ raise TypeError("Expected argument 'ca_chains' to be a list")
35
+ pulumi.set(__self__, "ca_chains", ca_chains)
36
+ if certificate and not isinstance(certificate, str):
37
+ raise TypeError("Expected argument 'certificate' to be a str")
38
+ pulumi.set(__self__, "certificate", certificate)
39
+ if disable_critical_extension_checks and not isinstance(disable_critical_extension_checks, bool):
40
+ raise TypeError("Expected argument 'disable_critical_extension_checks' to be a bool")
41
+ pulumi.set(__self__, "disable_critical_extension_checks", disable_critical_extension_checks)
42
+ if disable_name_checks and not isinstance(disable_name_checks, bool):
43
+ raise TypeError("Expected argument 'disable_name_checks' to be a bool")
44
+ pulumi.set(__self__, "disable_name_checks", disable_name_checks)
45
+ if disable_name_constraint_checks and not isinstance(disable_name_constraint_checks, bool):
46
+ raise TypeError("Expected argument 'disable_name_constraint_checks' to be a bool")
47
+ pulumi.set(__self__, "disable_name_constraint_checks", disable_name_constraint_checks)
48
+ if disable_path_length_checks and not isinstance(disable_path_length_checks, bool):
49
+ raise TypeError("Expected argument 'disable_path_length_checks' to be a bool")
50
+ pulumi.set(__self__, "disable_path_length_checks", disable_path_length_checks)
51
+ if id and not isinstance(id, str):
52
+ raise TypeError("Expected argument 'id' to be a str")
53
+ pulumi.set(__self__, "id", id)
54
+ if issuer_id and not isinstance(issuer_id, str):
55
+ raise TypeError("Expected argument 'issuer_id' to be a str")
56
+ pulumi.set(__self__, "issuer_id", issuer_id)
57
+ if issuer_name and not isinstance(issuer_name, str):
58
+ raise TypeError("Expected argument 'issuer_name' to be a str")
59
+ pulumi.set(__self__, "issuer_name", issuer_name)
60
+ if issuer_ref and not isinstance(issuer_ref, str):
61
+ raise TypeError("Expected argument 'issuer_ref' to be a str")
62
+ pulumi.set(__self__, "issuer_ref", issuer_ref)
63
+ if key_id and not isinstance(key_id, str):
64
+ raise TypeError("Expected argument 'key_id' to be a str")
65
+ pulumi.set(__self__, "key_id", key_id)
66
+ if leaf_not_after_behavior and not isinstance(leaf_not_after_behavior, str):
67
+ raise TypeError("Expected argument 'leaf_not_after_behavior' to be a str")
68
+ pulumi.set(__self__, "leaf_not_after_behavior", leaf_not_after_behavior)
69
+ if manual_chains and not isinstance(manual_chains, list):
70
+ raise TypeError("Expected argument 'manual_chains' to be a list")
71
+ pulumi.set(__self__, "manual_chains", manual_chains)
72
+ if namespace and not isinstance(namespace, str):
73
+ raise TypeError("Expected argument 'namespace' to be a str")
74
+ pulumi.set(__self__, "namespace", namespace)
75
+ if usage and not isinstance(usage, str):
76
+ raise TypeError("Expected argument 'usage' to be a str")
77
+ pulumi.set(__self__, "usage", usage)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter
81
+ def backend(self) -> _builtins.str:
82
+ return pulumi.get(self, "backend")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter(name="caChains")
86
+ def ca_chains(self) -> Sequence[_builtins.str]:
87
+ """
88
+ The CA chain as a list of format specific certificates.
89
+ """
90
+ return pulumi.get(self, "ca_chains")
91
+
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def certificate(self) -> _builtins.str:
95
+ """
96
+ Certificate associated with this issuer.
97
+ """
98
+ return pulumi.get(self, "certificate")
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="disableCriticalExtensionChecks")
102
+ def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
103
+ """
104
+ This determines whether this
105
+ issuer is able to issue certificates where the chain of trust (including the
106
+ issued certificate) contain critical extensions not processed by Vault.
107
+ """
108
+ return pulumi.get(self, "disable_critical_extension_checks")
109
+
110
+ @_builtins.property
111
+ @pulumi.getter(name="disableNameChecks")
112
+ def disable_name_checks(self) -> Optional[_builtins.bool]:
113
+ """
114
+ This determines whether this issuer is able
115
+ to issue certificates where the chain of trust (including the final issued
116
+ certificate) contains a link in which the subject of the issuing certificate
117
+ does not match the named issuer of the certificate it signed.
118
+ """
119
+ return pulumi.get(self, "disable_name_checks")
120
+
121
+ @_builtins.property
122
+ @pulumi.getter(name="disableNameConstraintChecks")
123
+ def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
124
+ """
125
+ This determines whether this
126
+ issuer is able to issue certificates where the chain of trust (including the
127
+ final issued certificate) violates the name constraints critical extension of
128
+ one of the issuer certificates in the chain.
129
+ """
130
+ return pulumi.get(self, "disable_name_constraint_checks")
131
+
132
+ @_builtins.property
133
+ @pulumi.getter(name="disablePathLengthChecks")
134
+ def disable_path_length_checks(self) -> Optional[_builtins.bool]:
135
+ """
136
+ This determines whether this issuer
137
+ is able to issue certificates where the chain of trust (including the final
138
+ issued certificate) is longer than allowed by a certificate authority in that
139
+ chain.
140
+ """
141
+ return pulumi.get(self, "disable_path_length_checks")
142
+
143
+ @_builtins.property
144
+ @pulumi.getter
145
+ def id(self) -> _builtins.str:
146
+ """
147
+ The provider-assigned unique ID for this managed resource.
148
+ """
149
+ return pulumi.get(self, "id")
150
+
151
+ @_builtins.property
152
+ @pulumi.getter(name="issuerId")
153
+ def issuer_id(self) -> _builtins.str:
154
+ """
155
+ ID of the issuer.
156
+ """
157
+ return pulumi.get(self, "issuer_id")
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="issuerName")
161
+ def issuer_name(self) -> _builtins.str:
162
+ """
163
+ Name of the issuer.
164
+ """
165
+ return pulumi.get(self, "issuer_name")
166
+
167
+ @_builtins.property
168
+ @pulumi.getter(name="issuerRef")
169
+ def issuer_ref(self) -> _builtins.str:
170
+ return pulumi.get(self, "issuer_ref")
171
+
172
+ @_builtins.property
173
+ @pulumi.getter(name="keyId")
174
+ def key_id(self) -> _builtins.str:
175
+ """
176
+ ID of the key used by the issuer.
177
+ """
178
+ return pulumi.get(self, "key_id")
179
+
180
+ @_builtins.property
181
+ @pulumi.getter(name="leafNotAfterBehavior")
182
+ def leaf_not_after_behavior(self) -> _builtins.str:
183
+ """
184
+ Behavior of a leaf's NotAfter field during issuance.
185
+ """
186
+ return pulumi.get(self, "leaf_not_after_behavior")
187
+
188
+ @_builtins.property
189
+ @pulumi.getter(name="manualChains")
190
+ def manual_chains(self) -> Sequence[_builtins.str]:
191
+ """
192
+ Chain of issuer references to build this issuer's computed
193
+ CAChain field from, when non-empty.
194
+ """
195
+ return pulumi.get(self, "manual_chains")
196
+
197
+ @_builtins.property
198
+ @pulumi.getter
199
+ def namespace(self) -> Optional[_builtins.str]:
200
+ return pulumi.get(self, "namespace")
201
+
202
+ @_builtins.property
203
+ @pulumi.getter
204
+ def usage(self) -> _builtins.str:
205
+ """
206
+ Allowed usages for this issuer.
207
+ """
208
+ return pulumi.get(self, "usage")
209
+
210
+
211
+ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
212
+ # pylint: disable=using-constant-test
213
+ def __await__(self):
214
+ if False:
215
+ yield self
216
+ return GetBackendIssuerResult(
217
+ backend=self.backend,
218
+ ca_chains=self.ca_chains,
219
+ certificate=self.certificate,
220
+ disable_critical_extension_checks=self.disable_critical_extension_checks,
221
+ disable_name_checks=self.disable_name_checks,
222
+ disable_name_constraint_checks=self.disable_name_constraint_checks,
223
+ disable_path_length_checks=self.disable_path_length_checks,
224
+ id=self.id,
225
+ issuer_id=self.issuer_id,
226
+ issuer_name=self.issuer_name,
227
+ issuer_ref=self.issuer_ref,
228
+ key_id=self.key_id,
229
+ leaf_not_after_behavior=self.leaf_not_after_behavior,
230
+ manual_chains=self.manual_chains,
231
+ namespace=self.namespace,
232
+ usage=self.usage)
233
+
234
+
235
+ def get_backend_issuer(backend: Optional[_builtins.str] = None,
236
+ disable_critical_extension_checks: Optional[_builtins.bool] = None,
237
+ disable_name_checks: Optional[_builtins.bool] = None,
238
+ disable_name_constraint_checks: Optional[_builtins.bool] = None,
239
+ disable_path_length_checks: Optional[_builtins.bool] = None,
240
+ issuer_ref: Optional[_builtins.str] = None,
241
+ namespace: Optional[_builtins.str] = None,
242
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
243
+ """
244
+ ## Example Usage
245
+
246
+ ```python
247
+ import pulumi
248
+ import pulumi_vault as vault
249
+
250
+ pki = vault.Mount("pki",
251
+ path="pki",
252
+ type="pki",
253
+ description="PKI secret engine mount")
254
+ root = vault.pkisecret.SecretBackendRootCert("root",
255
+ backend=pki.path,
256
+ type="internal",
257
+ common_name="example",
258
+ ttl="86400",
259
+ issuer_name="example")
260
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
261
+ issuer_ref=issuer_id))
262
+ ```
263
+
264
+
265
+ :param _builtins.str backend: The path to the PKI secret backend to
266
+ read the issuer from, with no leading or trailing `/`s.
267
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
268
+ issuer is able to issue certificates where the chain of trust (including the
269
+ issued certificate) contain critical extensions not processed by Vault.
270
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
271
+ to issue certificates where the chain of trust (including the final issued
272
+ certificate) contains a link in which the subject of the issuing certificate
273
+ does not match the named issuer of the certificate it signed.
274
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
275
+ issuer is able to issue certificates where the chain of trust (including the
276
+ final issued certificate) violates the name constraints critical extension of
277
+ one of the issuer certificates in the chain.
278
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
279
+ is able to issue certificates where the chain of trust (including the final
280
+ issued certificate) is longer than allowed by a certificate authority in that
281
+ chain.
282
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
283
+ :param _builtins.str namespace: The namespace of the target resource.
284
+ The value should not contain leading or trailing forward slashes.
285
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
286
+ *Available only for Vault Enterprise*.
287
+ """
288
+ __args__ = dict()
289
+ __args__['backend'] = backend
290
+ __args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
291
+ __args__['disableNameChecks'] = disable_name_checks
292
+ __args__['disableNameConstraintChecks'] = disable_name_constraint_checks
293
+ __args__['disablePathLengthChecks'] = disable_path_length_checks
294
+ __args__['issuerRef'] = issuer_ref
295
+ __args__['namespace'] = namespace
296
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
297
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult).value
298
+
299
+ return AwaitableGetBackendIssuerResult(
300
+ backend=pulumi.get(__ret__, 'backend'),
301
+ ca_chains=pulumi.get(__ret__, 'ca_chains'),
302
+ certificate=pulumi.get(__ret__, 'certificate'),
303
+ disable_critical_extension_checks=pulumi.get(__ret__, 'disable_critical_extension_checks'),
304
+ disable_name_checks=pulumi.get(__ret__, 'disable_name_checks'),
305
+ disable_name_constraint_checks=pulumi.get(__ret__, 'disable_name_constraint_checks'),
306
+ disable_path_length_checks=pulumi.get(__ret__, 'disable_path_length_checks'),
307
+ id=pulumi.get(__ret__, 'id'),
308
+ issuer_id=pulumi.get(__ret__, 'issuer_id'),
309
+ issuer_name=pulumi.get(__ret__, 'issuer_name'),
310
+ issuer_ref=pulumi.get(__ret__, 'issuer_ref'),
311
+ key_id=pulumi.get(__ret__, 'key_id'),
312
+ leaf_not_after_behavior=pulumi.get(__ret__, 'leaf_not_after_behavior'),
313
+ manual_chains=pulumi.get(__ret__, 'manual_chains'),
314
+ namespace=pulumi.get(__ret__, 'namespace'),
315
+ usage=pulumi.get(__ret__, 'usage'))
316
+ def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
317
+ disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
318
+ disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
319
+ disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
320
+ disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
321
+ issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
322
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
323
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
324
+ """
325
+ ## Example Usage
326
+
327
+ ```python
328
+ import pulumi
329
+ import pulumi_vault as vault
330
+
331
+ pki = vault.Mount("pki",
332
+ path="pki",
333
+ type="pki",
334
+ description="PKI secret engine mount")
335
+ root = vault.pkisecret.SecretBackendRootCert("root",
336
+ backend=pki.path,
337
+ type="internal",
338
+ common_name="example",
339
+ ttl="86400",
340
+ issuer_name="example")
341
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
342
+ issuer_ref=issuer_id))
343
+ ```
344
+
345
+
346
+ :param _builtins.str backend: The path to the PKI secret backend to
347
+ read the issuer from, with no leading or trailing `/`s.
348
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
349
+ issuer is able to issue certificates where the chain of trust (including the
350
+ issued certificate) contain critical extensions not processed by Vault.
351
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
352
+ to issue certificates where the chain of trust (including the final issued
353
+ certificate) contains a link in which the subject of the issuing certificate
354
+ does not match the named issuer of the certificate it signed.
355
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
356
+ issuer is able to issue certificates where the chain of trust (including the
357
+ final issued certificate) violates the name constraints critical extension of
358
+ one of the issuer certificates in the chain.
359
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
360
+ is able to issue certificates where the chain of trust (including the final
361
+ issued certificate) is longer than allowed by a certificate authority in that
362
+ chain.
363
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
364
+ :param _builtins.str namespace: The namespace of the target resource.
365
+ The value should not contain leading or trailing forward slashes.
366
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
367
+ *Available only for Vault Enterprise*.
368
+ """
369
+ __args__ = dict()
370
+ __args__['backend'] = backend
371
+ __args__['disableCriticalExtensionChecks'] = disable_critical_extension_checks
372
+ __args__['disableNameChecks'] = disable_name_checks
373
+ __args__['disableNameConstraintChecks'] = disable_name_constraint_checks
374
+ __args__['disablePathLengthChecks'] = disable_path_length_checks
375
+ __args__['issuerRef'] = issuer_ref
376
+ __args__['namespace'] = namespace
377
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
378
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
379
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
380
+ backend=pulumi.get(__response__, 'backend'),
381
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
382
+ certificate=pulumi.get(__response__, 'certificate'),
383
+ disable_critical_extension_checks=pulumi.get(__response__, 'disable_critical_extension_checks'),
384
+ disable_name_checks=pulumi.get(__response__, 'disable_name_checks'),
385
+ disable_name_constraint_checks=pulumi.get(__response__, 'disable_name_constraint_checks'),
386
+ disable_path_length_checks=pulumi.get(__response__, 'disable_path_length_checks'),
387
+ id=pulumi.get(__response__, 'id'),
388
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
389
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
390
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
391
+ key_id=pulumi.get(__response__, 'key_id'),
392
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
393
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
394
+ namespace=pulumi.get(__response__, 'namespace'),
395
+ usage=pulumi.get(__response__, 'usage')))
@@ -0,0 +1,192 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetBackendIssuersResult',
19
+ 'AwaitableGetBackendIssuersResult',
20
+ 'get_backend_issuers',
21
+ 'get_backend_issuers_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetBackendIssuersResult:
26
+ """
27
+ A collection of values returned by getBackendIssuers.
28
+ """
29
+ def __init__(__self__, backend=None, id=None, key_info=None, key_info_json=None, keys=None, namespace=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if key_info and not isinstance(key_info, dict):
37
+ raise TypeError("Expected argument 'key_info' to be a dict")
38
+ pulumi.set(__self__, "key_info", key_info)
39
+ if key_info_json and not isinstance(key_info_json, str):
40
+ raise TypeError("Expected argument 'key_info_json' to be a str")
41
+ pulumi.set(__self__, "key_info_json", key_info_json)
42
+ if keys and not isinstance(keys, list):
43
+ raise TypeError("Expected argument 'keys' to be a list")
44
+ pulumi.set(__self__, "keys", keys)
45
+ if namespace and not isinstance(namespace, str):
46
+ raise TypeError("Expected argument 'namespace' to be a str")
47
+ pulumi.set(__self__, "namespace", namespace)
48
+
49
+ @_builtins.property
50
+ @pulumi.getter
51
+ def backend(self) -> _builtins.str:
52
+ return pulumi.get(self, "backend")
53
+
54
+ @_builtins.property
55
+ @pulumi.getter
56
+ def id(self) -> _builtins.str:
57
+ """
58
+ The provider-assigned unique ID for this managed resource.
59
+ """
60
+ return pulumi.get(self, "id")
61
+
62
+ @_builtins.property
63
+ @pulumi.getter(name="keyInfo")
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
65
+ """
66
+ Map of issuer strings read from Vault.
67
+ """
68
+ return pulumi.get(self, "key_info")
69
+
70
+ @_builtins.property
71
+ @pulumi.getter(name="keyInfoJson")
72
+ def key_info_json(self) -> _builtins.str:
73
+ """
74
+ JSON-encoded issuer data read from Vault.
75
+ """
76
+ return pulumi.get(self, "key_info_json")
77
+
78
+ @_builtins.property
79
+ @pulumi.getter
80
+ def keys(self) -> Sequence[_builtins.str]:
81
+ """
82
+ Keys used by issuers under the backend path.
83
+ """
84
+ return pulumi.get(self, "keys")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter
88
+ def namespace(self) -> Optional[_builtins.str]:
89
+ return pulumi.get(self, "namespace")
90
+
91
+
92
+ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
93
+ # pylint: disable=using-constant-test
94
+ def __await__(self):
95
+ if False:
96
+ yield self
97
+ return GetBackendIssuersResult(
98
+ backend=self.backend,
99
+ id=self.id,
100
+ key_info=self.key_info,
101
+ key_info_json=self.key_info_json,
102
+ keys=self.keys,
103
+ namespace=self.namespace)
104
+
105
+
106
+ def get_backend_issuers(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
108
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
109
+ """
110
+ ## Example Usage
111
+
112
+ ```python
113
+ import pulumi
114
+ import pulumi_vault as vault
115
+
116
+ pki = vault.Mount("pki",
117
+ path="pki",
118
+ type="pki",
119
+ description="PKI secret engine mount")
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
121
+ backend=pki.path,
122
+ type="internal",
123
+ common_name="example",
124
+ ttl="86400",
125
+ issuer_name="example")
126
+ test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
127
+ ```
128
+
129
+
130
+ :param _builtins.str backend: The path to the PKI secret backend to
131
+ read the issuers from, with no leading or trailing `/`s.
132
+ :param _builtins.str namespace: The namespace of the target resource.
133
+ The value should not contain leading or trailing forward slashes.
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
+ *Available only for Vault Enterprise*.
136
+ """
137
+ __args__ = dict()
138
+ __args__['backend'] = backend
139
+ __args__['namespace'] = namespace
140
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
141
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult).value
142
+
143
+ return AwaitableGetBackendIssuersResult(
144
+ backend=pulumi.get(__ret__, 'backend'),
145
+ id=pulumi.get(__ret__, 'id'),
146
+ key_info=pulumi.get(__ret__, 'key_info'),
147
+ key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
+ keys=pulumi.get(__ret__, 'keys'),
149
+ namespace=pulumi.get(__ret__, 'namespace'))
150
+ def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
+ """
154
+ ## Example Usage
155
+
156
+ ```python
157
+ import pulumi
158
+ import pulumi_vault as vault
159
+
160
+ pki = vault.Mount("pki",
161
+ path="pki",
162
+ type="pki",
163
+ description="PKI secret engine mount")
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
165
+ backend=pki.path,
166
+ type="internal",
167
+ common_name="example",
168
+ ttl="86400",
169
+ issuer_name="example")
170
+ test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
171
+ ```
172
+
173
+
174
+ :param _builtins.str backend: The path to the PKI secret backend to
175
+ read the issuers from, with no leading or trailing `/`s.
176
+ :param _builtins.str namespace: The namespace of the target resource.
177
+ The value should not contain leading or trailing forward slashes.
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
+ *Available only for Vault Enterprise*.
180
+ """
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))