pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,211 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetBackendKeyResult',
19
+ 'AwaitableGetBackendKeyResult',
20
+ 'get_backend_key',
21
+ 'get_backend_key_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetBackendKeyResult:
26
+ """
27
+ A collection of values returned by getBackendKey.
28
+ """
29
+ def __init__(__self__, backend=None, id=None, key_id=None, key_name=None, key_ref=None, key_type=None, namespace=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if key_id and not isinstance(key_id, str):
37
+ raise TypeError("Expected argument 'key_id' to be a str")
38
+ pulumi.set(__self__, "key_id", key_id)
39
+ if key_name and not isinstance(key_name, str):
40
+ raise TypeError("Expected argument 'key_name' to be a str")
41
+ pulumi.set(__self__, "key_name", key_name)
42
+ if key_ref and not isinstance(key_ref, str):
43
+ raise TypeError("Expected argument 'key_ref' to be a str")
44
+ pulumi.set(__self__, "key_ref", key_ref)
45
+ if key_type and not isinstance(key_type, str):
46
+ raise TypeError("Expected argument 'key_type' to be a str")
47
+ pulumi.set(__self__, "key_type", key_type)
48
+ if namespace and not isinstance(namespace, str):
49
+ raise TypeError("Expected argument 'namespace' to be a str")
50
+ pulumi.set(__self__, "namespace", namespace)
51
+
52
+ @_builtins.property
53
+ @pulumi.getter
54
+ def backend(self) -> _builtins.str:
55
+ return pulumi.get(self, "backend")
56
+
57
+ @_builtins.property
58
+ @pulumi.getter
59
+ def id(self) -> _builtins.str:
60
+ """
61
+ The provider-assigned unique ID for this managed resource.
62
+ """
63
+ return pulumi.get(self, "id")
64
+
65
+ @_builtins.property
66
+ @pulumi.getter(name="keyId")
67
+ def key_id(self) -> _builtins.str:
68
+ """
69
+ ID of the key.
70
+ """
71
+ return pulumi.get(self, "key_id")
72
+
73
+ @_builtins.property
74
+ @pulumi.getter(name="keyName")
75
+ def key_name(self) -> _builtins.str:
76
+ """
77
+ Name of the key.
78
+ """
79
+ return pulumi.get(self, "key_name")
80
+
81
+ @_builtins.property
82
+ @pulumi.getter(name="keyRef")
83
+ def key_ref(self) -> _builtins.str:
84
+ return pulumi.get(self, "key_ref")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter(name="keyType")
88
+ def key_type(self) -> _builtins.str:
89
+ """
90
+ Type of the key.
91
+ """
92
+ return pulumi.get(self, "key_type")
93
+
94
+ @_builtins.property
95
+ @pulumi.getter
96
+ def namespace(self) -> Optional[_builtins.str]:
97
+ return pulumi.get(self, "namespace")
98
+
99
+
100
+ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
101
+ # pylint: disable=using-constant-test
102
+ def __await__(self):
103
+ if False:
104
+ yield self
105
+ return GetBackendKeyResult(
106
+ backend=self.backend,
107
+ id=self.id,
108
+ key_id=self.key_id,
109
+ key_name=self.key_name,
110
+ key_ref=self.key_ref,
111
+ key_type=self.key_type,
112
+ namespace=self.namespace)
113
+
114
+
115
+ def get_backend_key(backend: Optional[_builtins.str] = None,
116
+ key_ref: Optional[_builtins.str] = None,
117
+ namespace: Optional[_builtins.str] = None,
118
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
119
+ """
120
+ ## Example Usage
121
+
122
+ ```python
123
+ import pulumi
124
+ import pulumi_vault as vault
125
+
126
+ pki = vault.Mount("pki",
127
+ path="pki",
128
+ type="pki",
129
+ description="PKI secret engine mount")
130
+ key = vault.pkisecret.SecretBackendKey("key",
131
+ backend=pki.path,
132
+ type="internal",
133
+ key_name="example",
134
+ key_type="rsa",
135
+ key_bits=4096)
136
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
137
+ key_ref=key_id))
138
+ ```
139
+
140
+
141
+ :param _builtins.str backend: The path to the PKI secret backend to
142
+ read the key from, with no leading or trailing `/`s.
143
+ :param _builtins.str key_ref: Reference to an existing key.
144
+ :param _builtins.str namespace: The namespace of the target resource.
145
+ The value should not contain leading or trailing forward slashes.
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
+ *Available only for Vault Enterprise*.
148
+ """
149
+ __args__ = dict()
150
+ __args__['backend'] = backend
151
+ __args__['keyRef'] = key_ref
152
+ __args__['namespace'] = namespace
153
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
154
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult).value
155
+
156
+ return AwaitableGetBackendKeyResult(
157
+ backend=pulumi.get(__ret__, 'backend'),
158
+ id=pulumi.get(__ret__, 'id'),
159
+ key_id=pulumi.get(__ret__, 'key_id'),
160
+ key_name=pulumi.get(__ret__, 'key_name'),
161
+ key_ref=pulumi.get(__ret__, 'key_ref'),
162
+ key_type=pulumi.get(__ret__, 'key_type'),
163
+ namespace=pulumi.get(__ret__, 'namespace'))
164
+ def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
165
+ key_ref: Optional[pulumi.Input[_builtins.str]] = None,
166
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
167
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
168
+ """
169
+ ## Example Usage
170
+
171
+ ```python
172
+ import pulumi
173
+ import pulumi_vault as vault
174
+
175
+ pki = vault.Mount("pki",
176
+ path="pki",
177
+ type="pki",
178
+ description="PKI secret engine mount")
179
+ key = vault.pkisecret.SecretBackendKey("key",
180
+ backend=pki.path,
181
+ type="internal",
182
+ key_name="example",
183
+ key_type="rsa",
184
+ key_bits=4096)
185
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
186
+ key_ref=key_id))
187
+ ```
188
+
189
+
190
+ :param _builtins.str backend: The path to the PKI secret backend to
191
+ read the key from, with no leading or trailing `/`s.
192
+ :param _builtins.str key_ref: Reference to an existing key.
193
+ :param _builtins.str namespace: The namespace of the target resource.
194
+ The value should not contain leading or trailing forward slashes.
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
+ *Available only for Vault Enterprise*.
197
+ """
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -0,0 +1,192 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetBackendKeysResult',
19
+ 'AwaitableGetBackendKeysResult',
20
+ 'get_backend_keys',
21
+ 'get_backend_keys_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetBackendKeysResult:
26
+ """
27
+ A collection of values returned by getBackendKeys.
28
+ """
29
+ def __init__(__self__, backend=None, id=None, key_info=None, key_info_json=None, keys=None, namespace=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if id and not isinstance(id, str):
34
+ raise TypeError("Expected argument 'id' to be a str")
35
+ pulumi.set(__self__, "id", id)
36
+ if key_info and not isinstance(key_info, dict):
37
+ raise TypeError("Expected argument 'key_info' to be a dict")
38
+ pulumi.set(__self__, "key_info", key_info)
39
+ if key_info_json and not isinstance(key_info_json, str):
40
+ raise TypeError("Expected argument 'key_info_json' to be a str")
41
+ pulumi.set(__self__, "key_info_json", key_info_json)
42
+ if keys and not isinstance(keys, list):
43
+ raise TypeError("Expected argument 'keys' to be a list")
44
+ pulumi.set(__self__, "keys", keys)
45
+ if namespace and not isinstance(namespace, str):
46
+ raise TypeError("Expected argument 'namespace' to be a str")
47
+ pulumi.set(__self__, "namespace", namespace)
48
+
49
+ @_builtins.property
50
+ @pulumi.getter
51
+ def backend(self) -> _builtins.str:
52
+ return pulumi.get(self, "backend")
53
+
54
+ @_builtins.property
55
+ @pulumi.getter
56
+ def id(self) -> _builtins.str:
57
+ """
58
+ The provider-assigned unique ID for this managed resource.
59
+ """
60
+ return pulumi.get(self, "id")
61
+
62
+ @_builtins.property
63
+ @pulumi.getter(name="keyInfo")
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
65
+ """
66
+ Map of key strings read from Vault.
67
+ """
68
+ return pulumi.get(self, "key_info")
69
+
70
+ @_builtins.property
71
+ @pulumi.getter(name="keyInfoJson")
72
+ def key_info_json(self) -> _builtins.str:
73
+ """
74
+ JSON-encoded key data read from Vault.
75
+ """
76
+ return pulumi.get(self, "key_info_json")
77
+
78
+ @_builtins.property
79
+ @pulumi.getter
80
+ def keys(self) -> Sequence[_builtins.str]:
81
+ """
82
+ Keys used under the backend path.
83
+ """
84
+ return pulumi.get(self, "keys")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter
88
+ def namespace(self) -> Optional[_builtins.str]:
89
+ return pulumi.get(self, "namespace")
90
+
91
+
92
+ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
93
+ # pylint: disable=using-constant-test
94
+ def __await__(self):
95
+ if False:
96
+ yield self
97
+ return GetBackendKeysResult(
98
+ backend=self.backend,
99
+ id=self.id,
100
+ key_info=self.key_info,
101
+ key_info_json=self.key_info_json,
102
+ keys=self.keys,
103
+ namespace=self.namespace)
104
+
105
+
106
+ def get_backend_keys(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
108
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
109
+ """
110
+ ## Example Usage
111
+
112
+ ```python
113
+ import pulumi
114
+ import pulumi_vault as vault
115
+
116
+ pki = vault.Mount("pki",
117
+ path="pki",
118
+ type="pki",
119
+ description="PKI secret engine mount")
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
121
+ backend=pki.path,
122
+ type="internal",
123
+ common_name="example",
124
+ ttl="86400",
125
+ key_name="example")
126
+ example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
127
+ ```
128
+
129
+
130
+ :param _builtins.str backend: The path to the PKI secret backend to
131
+ read the keys from, with no leading or trailing `/`s.
132
+ :param _builtins.str namespace: The namespace of the target resource.
133
+ The value should not contain leading or trailing forward slashes.
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
+ *Available only for Vault Enterprise*.
136
+ """
137
+ __args__ = dict()
138
+ __args__['backend'] = backend
139
+ __args__['namespace'] = namespace
140
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
141
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult).value
142
+
143
+ return AwaitableGetBackendKeysResult(
144
+ backend=pulumi.get(__ret__, 'backend'),
145
+ id=pulumi.get(__ret__, 'id'),
146
+ key_info=pulumi.get(__ret__, 'key_info'),
147
+ key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
+ keys=pulumi.get(__ret__, 'keys'),
149
+ namespace=pulumi.get(__ret__, 'namespace'))
150
+ def get_backend_keys_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
153
+ """
154
+ ## Example Usage
155
+
156
+ ```python
157
+ import pulumi
158
+ import pulumi_vault as vault
159
+
160
+ pki = vault.Mount("pki",
161
+ path="pki",
162
+ type="pki",
163
+ description="PKI secret engine mount")
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
165
+ backend=pki.path,
166
+ type="internal",
167
+ common_name="example",
168
+ ttl="86400",
169
+ key_name="example")
170
+ example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
171
+ ```
172
+
173
+
174
+ :param _builtins.str backend: The path to the PKI secret backend to
175
+ read the keys from, with no leading or trailing `/`s.
176
+ :param _builtins.str namespace: The namespace of the target resource.
177
+ The value should not contain leading or trailing forward slashes.
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
+ *Available only for Vault Enterprise*.
180
+ """
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -0,0 +1,270 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'BackendConfigCmpv2Authenticators',
19
+ 'BackendConfigEstAuthenticators',
20
+ 'BackendConfigScepAuthenticators',
21
+ 'BackendConfigScepExternalValidation',
22
+ 'SecretBackendRolePolicyIdentifier',
23
+ 'GetBackendConfigCmpv2AuthenticatorResult',
24
+ 'GetBackendConfigEstAuthenticatorResult',
25
+ 'GetBackendConfigScepAuthenticatorResult',
26
+ 'GetBackendConfigScepExternalValidationResult',
27
+ ]
28
+
29
+ @pulumi.output_type
30
+ class BackendConfigCmpv2Authenticators(dict):
31
+ def __init__(__self__, *,
32
+ cert: Optional[Mapping[str, _builtins.str]] = None):
33
+ """
34
+ :param Mapping[str, _builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
35
+ """
36
+ if cert is not None:
37
+ pulumi.set(__self__, "cert", cert)
38
+
39
+ @_builtins.property
40
+ @pulumi.getter
41
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
42
+ """
43
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
44
+ """
45
+ return pulumi.get(self, "cert")
46
+
47
+
48
+ @pulumi.output_type
49
+ class BackendConfigEstAuthenticators(dict):
50
+ def __init__(__self__, *,
51
+ cert: Optional[Mapping[str, _builtins.str]] = None,
52
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
53
+ """
54
+ :param Mapping[str, _builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
55
+ :param Mapping[str, _builtins.str] userpass: The accessor (required) property for user pass auth backends.
56
+ """
57
+ if cert is not None:
58
+ pulumi.set(__self__, "cert", cert)
59
+ if userpass is not None:
60
+ pulumi.set(__self__, "userpass", userpass)
61
+
62
+ @_builtins.property
63
+ @pulumi.getter
64
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
65
+ """
66
+ The accessor (required) and cert_role (optional) properties for cert auth backends.
67
+ """
68
+ return pulumi.get(self, "cert")
69
+
70
+ @_builtins.property
71
+ @pulumi.getter
72
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
73
+ """
74
+ The accessor (required) property for user pass auth backends.
75
+ """
76
+ return pulumi.get(self, "userpass")
77
+
78
+
79
+ @pulumi.output_type
80
+ class BackendConfigScepAuthenticators(dict):
81
+ def __init__(__self__, *,
82
+ cert: Optional[Mapping[str, _builtins.str]] = None,
83
+ scep: Optional[Mapping[str, _builtins.str]] = None):
84
+ """
85
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
86
+ :param Mapping[str, _builtins.str] scep: The accessor property for SCEP auth backends
87
+ """
88
+ if cert is not None:
89
+ pulumi.set(__self__, "cert", cert)
90
+ if scep is not None:
91
+ pulumi.set(__self__, "scep", scep)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
96
+ """
97
+ The accessor and cert_role properties for cert auth backends
98
+ """
99
+ return pulumi.get(self, "cert")
100
+
101
+ @_builtins.property
102
+ @pulumi.getter
103
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
104
+ """
105
+ The accessor property for SCEP auth backends
106
+ """
107
+ return pulumi.get(self, "scep")
108
+
109
+
110
+ @pulumi.output_type
111
+ class BackendConfigScepExternalValidation(dict):
112
+ def __init__(__self__, *,
113
+ intune: Optional[Mapping[str, _builtins.str]] = None):
114
+ """
115
+ :param Mapping[str, _builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
116
+ """
117
+ if intune is not None:
118
+ pulumi.set(__self__, "intune", intune)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter
122
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
123
+ """
124
+ The credentials to enable Microsoft Intune validation of SCEP requests
125
+ """
126
+ return pulumi.get(self, "intune")
127
+
128
+
129
+ @pulumi.output_type
130
+ class SecretBackendRolePolicyIdentifier(dict):
131
+ def __init__(__self__, *,
132
+ oid: _builtins.str,
133
+ cps: Optional[_builtins.str] = None,
134
+ notice: Optional[_builtins.str] = None):
135
+ """
136
+ :param _builtins.str oid: The OID for the policy identifier
137
+ :param _builtins.str cps: The URL of the CPS for the policy identifier
138
+ :param _builtins.str notice: A notice for the policy identifier
139
+ """
140
+ pulumi.set(__self__, "oid", oid)
141
+ if cps is not None:
142
+ pulumi.set(__self__, "cps", cps)
143
+ if notice is not None:
144
+ pulumi.set(__self__, "notice", notice)
145
+
146
+ @_builtins.property
147
+ @pulumi.getter
148
+ def oid(self) -> _builtins.str:
149
+ """
150
+ The OID for the policy identifier
151
+ """
152
+ return pulumi.get(self, "oid")
153
+
154
+ @_builtins.property
155
+ @pulumi.getter
156
+ def cps(self) -> Optional[_builtins.str]:
157
+ """
158
+ The URL of the CPS for the policy identifier
159
+ """
160
+ return pulumi.get(self, "cps")
161
+
162
+ @_builtins.property
163
+ @pulumi.getter
164
+ def notice(self) -> Optional[_builtins.str]:
165
+ """
166
+ A notice for the policy identifier
167
+ """
168
+ return pulumi.get(self, "notice")
169
+
170
+
171
+ @pulumi.output_type
172
+ class GetBackendConfigCmpv2AuthenticatorResult(dict):
173
+ def __init__(__self__, *,
174
+ cert: Optional[Mapping[str, _builtins.str]] = None):
175
+ """
176
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
177
+ """
178
+ if cert is not None:
179
+ pulumi.set(__self__, "cert", cert)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter
183
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
184
+ """
185
+ The accessor and cert_role properties for cert auth backends
186
+ """
187
+ return pulumi.get(self, "cert")
188
+
189
+
190
+ @pulumi.output_type
191
+ class GetBackendConfigEstAuthenticatorResult(dict):
192
+ def __init__(__self__, *,
193
+ cert: Optional[Mapping[str, _builtins.str]] = None,
194
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
195
+ """
196
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
197
+ :param Mapping[str, _builtins.str] userpass: The accessor property for user pass auth backends.
198
+ """
199
+ if cert is not None:
200
+ pulumi.set(__self__, "cert", cert)
201
+ if userpass is not None:
202
+ pulumi.set(__self__, "userpass", userpass)
203
+
204
+ @_builtins.property
205
+ @pulumi.getter
206
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
207
+ """
208
+ The accessor and cert_role properties for cert auth backends.
209
+ """
210
+ return pulumi.get(self, "cert")
211
+
212
+ @_builtins.property
213
+ @pulumi.getter
214
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
215
+ """
216
+ The accessor property for user pass auth backends.
217
+ """
218
+ return pulumi.get(self, "userpass")
219
+
220
+
221
+ @pulumi.output_type
222
+ class GetBackendConfigScepAuthenticatorResult(dict):
223
+ def __init__(__self__, *,
224
+ cert: Optional[Mapping[str, _builtins.str]] = None,
225
+ scep: Optional[Mapping[str, _builtins.str]] = None):
226
+ """
227
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
228
+ :param Mapping[str, _builtins.str] scep: The accessor property for scep auth backends.
229
+ """
230
+ if cert is not None:
231
+ pulumi.set(__self__, "cert", cert)
232
+ if scep is not None:
233
+ pulumi.set(__self__, "scep", scep)
234
+
235
+ @_builtins.property
236
+ @pulumi.getter
237
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
238
+ """
239
+ The accessor and cert_role properties for cert auth backends.
240
+ """
241
+ return pulumi.get(self, "cert")
242
+
243
+ @_builtins.property
244
+ @pulumi.getter
245
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
246
+ """
247
+ The accessor property for scep auth backends.
248
+ """
249
+ return pulumi.get(self, "scep")
250
+
251
+
252
+ @pulumi.output_type
253
+ class GetBackendConfigScepExternalValidationResult(dict):
254
+ def __init__(__self__, *,
255
+ intune: Optional[Mapping[str, _builtins.str]] = None):
256
+ """
257
+ :param Mapping[str, _builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
258
+ """
259
+ if intune is not None:
260
+ pulumi.set(__self__, "intune", intune)
261
+
262
+ @_builtins.property
263
+ @pulumi.getter
264
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
265
+ """
266
+ The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
267
+ """
268
+ return pulumi.get(self, "intune")
269
+
270
+