pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'SecretBackendRoleAllowedUserKeyConfigArgs',
|
|
19
|
+
'SecretBackendRoleAllowedUserKeyConfigArgsDict',
|
|
20
|
+
]
|
|
21
|
+
|
|
22
|
+
MYPY = False
|
|
23
|
+
|
|
24
|
+
if not MYPY:
|
|
25
|
+
class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
|
|
26
|
+
lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]
|
|
27
|
+
"""
|
|
28
|
+
List of allowed key lengths, vault-1.10 and above
|
|
29
|
+
"""
|
|
30
|
+
type: pulumi.Input[_builtins.str]
|
|
31
|
+
"""
|
|
32
|
+
Key type, choices:
|
|
33
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
|
34
|
+
"""
|
|
35
|
+
elif False:
|
|
36
|
+
SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
|
|
37
|
+
|
|
38
|
+
@pulumi.input_type
|
|
39
|
+
class SecretBackendRoleAllowedUserKeyConfigArgs:
|
|
40
|
+
def __init__(__self__, *,
|
|
41
|
+
lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]],
|
|
42
|
+
type: pulumi.Input[_builtins.str]):
|
|
43
|
+
"""
|
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.int]]] lengths: List of allowed key lengths, vault-1.10 and above
|
|
45
|
+
:param pulumi.Input[_builtins.str] type: Key type, choices:
|
|
46
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
|
47
|
+
"""
|
|
48
|
+
pulumi.set(__self__, "lengths", lengths)
|
|
49
|
+
pulumi.set(__self__, "type", type)
|
|
50
|
+
|
|
51
|
+
@_builtins.property
|
|
52
|
+
@pulumi.getter
|
|
53
|
+
def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]:
|
|
54
|
+
"""
|
|
55
|
+
List of allowed key lengths, vault-1.10 and above
|
|
56
|
+
"""
|
|
57
|
+
return pulumi.get(self, "lengths")
|
|
58
|
+
|
|
59
|
+
@lengths.setter
|
|
60
|
+
def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]):
|
|
61
|
+
pulumi.set(self, "lengths", value)
|
|
62
|
+
|
|
63
|
+
@_builtins.property
|
|
64
|
+
@pulumi.getter
|
|
65
|
+
def type(self) -> pulumi.Input[_builtins.str]:
|
|
66
|
+
"""
|
|
67
|
+
Key type, choices:
|
|
68
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
|
69
|
+
"""
|
|
70
|
+
return pulumi.get(self, "type")
|
|
71
|
+
|
|
72
|
+
@type.setter
|
|
73
|
+
def type(self, value: pulumi.Input[_builtins.str]):
|
|
74
|
+
pulumi.set(self, "type", value)
|
|
75
|
+
|
|
76
|
+
|
|
@@ -0,0 +1,294 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetSecretBackendSignResult',
|
|
19
|
+
'AwaitableGetSecretBackendSignResult',
|
|
20
|
+
'get_secret_backend_sign',
|
|
21
|
+
'get_secret_backend_sign_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetSecretBackendSignResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getSecretBackendSign.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, cert_type=None, critical_options=None, extensions=None, id=None, key_id=None, name=None, namespace=None, path=None, public_key=None, serial_number=None, signed_key=None, ttl=None, valid_principals=None):
|
|
30
|
+
if cert_type and not isinstance(cert_type, str):
|
|
31
|
+
raise TypeError("Expected argument 'cert_type' to be a str")
|
|
32
|
+
pulumi.set(__self__, "cert_type", cert_type)
|
|
33
|
+
if critical_options and not isinstance(critical_options, dict):
|
|
34
|
+
raise TypeError("Expected argument 'critical_options' to be a dict")
|
|
35
|
+
pulumi.set(__self__, "critical_options", critical_options)
|
|
36
|
+
if extensions and not isinstance(extensions, dict):
|
|
37
|
+
raise TypeError("Expected argument 'extensions' to be a dict")
|
|
38
|
+
pulumi.set(__self__, "extensions", extensions)
|
|
39
|
+
if id and not isinstance(id, str):
|
|
40
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
41
|
+
pulumi.set(__self__, "id", id)
|
|
42
|
+
if key_id and not isinstance(key_id, str):
|
|
43
|
+
raise TypeError("Expected argument 'key_id' to be a str")
|
|
44
|
+
pulumi.set(__self__, "key_id", key_id)
|
|
45
|
+
if name and not isinstance(name, str):
|
|
46
|
+
raise TypeError("Expected argument 'name' to be a str")
|
|
47
|
+
pulumi.set(__self__, "name", name)
|
|
48
|
+
if namespace and not isinstance(namespace, str):
|
|
49
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
50
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
51
|
+
if path and not isinstance(path, str):
|
|
52
|
+
raise TypeError("Expected argument 'path' to be a str")
|
|
53
|
+
pulumi.set(__self__, "path", path)
|
|
54
|
+
if public_key and not isinstance(public_key, str):
|
|
55
|
+
raise TypeError("Expected argument 'public_key' to be a str")
|
|
56
|
+
pulumi.set(__self__, "public_key", public_key)
|
|
57
|
+
if serial_number and not isinstance(serial_number, str):
|
|
58
|
+
raise TypeError("Expected argument 'serial_number' to be a str")
|
|
59
|
+
pulumi.set(__self__, "serial_number", serial_number)
|
|
60
|
+
if signed_key and not isinstance(signed_key, str):
|
|
61
|
+
raise TypeError("Expected argument 'signed_key' to be a str")
|
|
62
|
+
pulumi.set(__self__, "signed_key", signed_key)
|
|
63
|
+
if ttl and not isinstance(ttl, str):
|
|
64
|
+
raise TypeError("Expected argument 'ttl' to be a str")
|
|
65
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
66
|
+
if valid_principals and not isinstance(valid_principals, str):
|
|
67
|
+
raise TypeError("Expected argument 'valid_principals' to be a str")
|
|
68
|
+
pulumi.set(__self__, "valid_principals", valid_principals)
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
@pulumi.getter(name="certType")
|
|
72
|
+
def cert_type(self) -> Optional[_builtins.str]:
|
|
73
|
+
return pulumi.get(self, "cert_type")
|
|
74
|
+
|
|
75
|
+
@_builtins.property
|
|
76
|
+
@pulumi.getter(name="criticalOptions")
|
|
77
|
+
def critical_options(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
78
|
+
return pulumi.get(self, "critical_options")
|
|
79
|
+
|
|
80
|
+
@_builtins.property
|
|
81
|
+
@pulumi.getter
|
|
82
|
+
def extensions(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
83
|
+
return pulumi.get(self, "extensions")
|
|
84
|
+
|
|
85
|
+
@_builtins.property
|
|
86
|
+
@pulumi.getter
|
|
87
|
+
def id(self) -> _builtins.str:
|
|
88
|
+
"""
|
|
89
|
+
The provider-assigned unique ID for this managed resource.
|
|
90
|
+
"""
|
|
91
|
+
return pulumi.get(self, "id")
|
|
92
|
+
|
|
93
|
+
@_builtins.property
|
|
94
|
+
@pulumi.getter(name="keyId")
|
|
95
|
+
def key_id(self) -> Optional[_builtins.str]:
|
|
96
|
+
return pulumi.get(self, "key_id")
|
|
97
|
+
|
|
98
|
+
@_builtins.property
|
|
99
|
+
@pulumi.getter
|
|
100
|
+
def name(self) -> _builtins.str:
|
|
101
|
+
return pulumi.get(self, "name")
|
|
102
|
+
|
|
103
|
+
@_builtins.property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
106
|
+
return pulumi.get(self, "namespace")
|
|
107
|
+
|
|
108
|
+
@_builtins.property
|
|
109
|
+
@pulumi.getter
|
|
110
|
+
def path(self) -> _builtins.str:
|
|
111
|
+
return pulumi.get(self, "path")
|
|
112
|
+
|
|
113
|
+
@_builtins.property
|
|
114
|
+
@pulumi.getter(name="publicKey")
|
|
115
|
+
def public_key(self) -> _builtins.str:
|
|
116
|
+
return pulumi.get(self, "public_key")
|
|
117
|
+
|
|
118
|
+
@_builtins.property
|
|
119
|
+
@pulumi.getter(name="serialNumber")
|
|
120
|
+
def serial_number(self) -> _builtins.str:
|
|
121
|
+
"""
|
|
122
|
+
The serial number of the certificate returned from Vault
|
|
123
|
+
"""
|
|
124
|
+
return pulumi.get(self, "serial_number")
|
|
125
|
+
|
|
126
|
+
@_builtins.property
|
|
127
|
+
@pulumi.getter(name="signedKey")
|
|
128
|
+
def signed_key(self) -> _builtins.str:
|
|
129
|
+
"""
|
|
130
|
+
The signed certificate returned from Vault
|
|
131
|
+
"""
|
|
132
|
+
return pulumi.get(self, "signed_key")
|
|
133
|
+
|
|
134
|
+
@_builtins.property
|
|
135
|
+
@pulumi.getter
|
|
136
|
+
def ttl(self) -> Optional[_builtins.str]:
|
|
137
|
+
return pulumi.get(self, "ttl")
|
|
138
|
+
|
|
139
|
+
@_builtins.property
|
|
140
|
+
@pulumi.getter(name="validPrincipals")
|
|
141
|
+
def valid_principals(self) -> Optional[_builtins.str]:
|
|
142
|
+
return pulumi.get(self, "valid_principals")
|
|
143
|
+
|
|
144
|
+
|
|
145
|
+
class AwaitableGetSecretBackendSignResult(GetSecretBackendSignResult):
|
|
146
|
+
# pylint: disable=using-constant-test
|
|
147
|
+
def __await__(self):
|
|
148
|
+
if False:
|
|
149
|
+
yield self
|
|
150
|
+
return GetSecretBackendSignResult(
|
|
151
|
+
cert_type=self.cert_type,
|
|
152
|
+
critical_options=self.critical_options,
|
|
153
|
+
extensions=self.extensions,
|
|
154
|
+
id=self.id,
|
|
155
|
+
key_id=self.key_id,
|
|
156
|
+
name=self.name,
|
|
157
|
+
namespace=self.namespace,
|
|
158
|
+
path=self.path,
|
|
159
|
+
public_key=self.public_key,
|
|
160
|
+
serial_number=self.serial_number,
|
|
161
|
+
signed_key=self.signed_key,
|
|
162
|
+
ttl=self.ttl,
|
|
163
|
+
valid_principals=self.valid_principals)
|
|
164
|
+
|
|
165
|
+
|
|
166
|
+
def get_secret_backend_sign(cert_type: Optional[_builtins.str] = None,
|
|
167
|
+
critical_options: Optional[Mapping[str, _builtins.str]] = None,
|
|
168
|
+
extensions: Optional[Mapping[str, _builtins.str]] = None,
|
|
169
|
+
key_id: Optional[_builtins.str] = None,
|
|
170
|
+
name: Optional[_builtins.str] = None,
|
|
171
|
+
namespace: Optional[_builtins.str] = None,
|
|
172
|
+
path: Optional[_builtins.str] = None,
|
|
173
|
+
public_key: Optional[_builtins.str] = None,
|
|
174
|
+
ttl: Optional[_builtins.str] = None,
|
|
175
|
+
valid_principals: Optional[_builtins.str] = None,
|
|
176
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretBackendSignResult:
|
|
177
|
+
"""
|
|
178
|
+
This is a data source which can be used to sign an SSH public key
|
|
179
|
+
|
|
180
|
+
## Example Usage
|
|
181
|
+
|
|
182
|
+
```python
|
|
183
|
+
import pulumi
|
|
184
|
+
import pulumi_vault as vault
|
|
185
|
+
|
|
186
|
+
test = vault.ssh.get_secret_backend_sign(path="ssh",
|
|
187
|
+
public_key="ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDR6q4PTcuIkpdGEqaCaxnR8/REqlbSiEIKaRZkVSjiTXOaiSfUsy9cY2+7+oO9fLMUrhylImerjzEoagX1IjYvc9IeUBaRnfacN7QwUDfstgp2jknbg7rNX9j9nFxwltV/jYQPcRq8Ud0wn1nb4qixq+diM7+Up+xJOeaKxbpjEUJH5dcvaBB+Aa24tJpjOQxtFyQ6dUxlgJu0tcygZR92kKYCVjZDohlSED3i/Ak2KFwqCKx2IZWq9z1vMEgmRzv++4Qt1OsbpW8itiCyWn6lmV33eDCdjMrr9TEThQNnMinPrHdmVUnPZ/OomP+rLDRE9lQR16uaSvKhg5TWOFIXRPyEhX9arEATrE4KSWeQN2qgHOb6P24YqgEm1ZdHJq25q/nBBAa1x0tFMiWqZwOsGeJ9nTeOeyiqFKH5YRBo6DIy3ag3taFsfQSve6oqjnrudUd1hJ8/bNSz8amECfP0ULvAEAgpiurj3eCPc3OcXl4tAld9F6KwabEJV5eelcs= user@example.com",
|
|
188
|
+
name="test",
|
|
189
|
+
valid_principals="my-user")
|
|
190
|
+
```
|
|
191
|
+
|
|
192
|
+
|
|
193
|
+
:param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
|
|
194
|
+
:param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
|
|
195
|
+
:param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
|
|
196
|
+
:param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
|
|
197
|
+
:param _builtins.str name: Specifies the name of the role to sign.
|
|
198
|
+
:param _builtins.str path: Full path where SSH backend is mounted.
|
|
199
|
+
:param _builtins.str public_key: Specifies the SSH public key that should be signed.
|
|
200
|
+
:param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
|
|
201
|
+
:param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
|
|
202
|
+
"""
|
|
203
|
+
__args__ = dict()
|
|
204
|
+
__args__['certType'] = cert_type
|
|
205
|
+
__args__['criticalOptions'] = critical_options
|
|
206
|
+
__args__['extensions'] = extensions
|
|
207
|
+
__args__['keyId'] = key_id
|
|
208
|
+
__args__['name'] = name
|
|
209
|
+
__args__['namespace'] = namespace
|
|
210
|
+
__args__['path'] = path
|
|
211
|
+
__args__['publicKey'] = public_key
|
|
212
|
+
__args__['ttl'] = ttl
|
|
213
|
+
__args__['validPrincipals'] = valid_principals
|
|
214
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
215
|
+
__ret__ = pulumi.runtime.invoke('vault:ssh/getSecretBackendSign:getSecretBackendSign', __args__, opts=opts, typ=GetSecretBackendSignResult).value
|
|
216
|
+
|
|
217
|
+
return AwaitableGetSecretBackendSignResult(
|
|
218
|
+
cert_type=pulumi.get(__ret__, 'cert_type'),
|
|
219
|
+
critical_options=pulumi.get(__ret__, 'critical_options'),
|
|
220
|
+
extensions=pulumi.get(__ret__, 'extensions'),
|
|
221
|
+
id=pulumi.get(__ret__, 'id'),
|
|
222
|
+
key_id=pulumi.get(__ret__, 'key_id'),
|
|
223
|
+
name=pulumi.get(__ret__, 'name'),
|
|
224
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
225
|
+
path=pulumi.get(__ret__, 'path'),
|
|
226
|
+
public_key=pulumi.get(__ret__, 'public_key'),
|
|
227
|
+
serial_number=pulumi.get(__ret__, 'serial_number'),
|
|
228
|
+
signed_key=pulumi.get(__ret__, 'signed_key'),
|
|
229
|
+
ttl=pulumi.get(__ret__, 'ttl'),
|
|
230
|
+
valid_principals=pulumi.get(__ret__, 'valid_principals'))
|
|
231
|
+
def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
232
|
+
critical_options: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
|
233
|
+
extensions: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
|
234
|
+
key_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
235
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
236
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
237
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
238
|
+
public_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
239
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
240
|
+
valid_principals: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
241
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretBackendSignResult]:
|
|
242
|
+
"""
|
|
243
|
+
This is a data source which can be used to sign an SSH public key
|
|
244
|
+
|
|
245
|
+
## Example Usage
|
|
246
|
+
|
|
247
|
+
```python
|
|
248
|
+
import pulumi
|
|
249
|
+
import pulumi_vault as vault
|
|
250
|
+
|
|
251
|
+
test = vault.ssh.get_secret_backend_sign(path="ssh",
|
|
252
|
+
public_key="ssh-rsa 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 user@example.com",
|
|
253
|
+
name="test",
|
|
254
|
+
valid_principals="my-user")
|
|
255
|
+
```
|
|
256
|
+
|
|
257
|
+
|
|
258
|
+
:param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
|
|
259
|
+
:param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
|
|
260
|
+
:param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
|
|
261
|
+
:param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
|
|
262
|
+
:param _builtins.str name: Specifies the name of the role to sign.
|
|
263
|
+
:param _builtins.str path: Full path where SSH backend is mounted.
|
|
264
|
+
:param _builtins.str public_key: Specifies the SSH public key that should be signed.
|
|
265
|
+
:param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
|
|
266
|
+
:param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
|
|
267
|
+
"""
|
|
268
|
+
__args__ = dict()
|
|
269
|
+
__args__['certType'] = cert_type
|
|
270
|
+
__args__['criticalOptions'] = critical_options
|
|
271
|
+
__args__['extensions'] = extensions
|
|
272
|
+
__args__['keyId'] = key_id
|
|
273
|
+
__args__['name'] = name
|
|
274
|
+
__args__['namespace'] = namespace
|
|
275
|
+
__args__['path'] = path
|
|
276
|
+
__args__['publicKey'] = public_key
|
|
277
|
+
__args__['ttl'] = ttl
|
|
278
|
+
__args__['validPrincipals'] = valid_principals
|
|
279
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
280
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ssh/getSecretBackendSign:getSecretBackendSign', __args__, opts=opts, typ=GetSecretBackendSignResult)
|
|
281
|
+
return __ret__.apply(lambda __response__: GetSecretBackendSignResult(
|
|
282
|
+
cert_type=pulumi.get(__response__, 'cert_type'),
|
|
283
|
+
critical_options=pulumi.get(__response__, 'critical_options'),
|
|
284
|
+
extensions=pulumi.get(__response__, 'extensions'),
|
|
285
|
+
id=pulumi.get(__response__, 'id'),
|
|
286
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
|
287
|
+
name=pulumi.get(__response__, 'name'),
|
|
288
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
289
|
+
path=pulumi.get(__response__, 'path'),
|
|
290
|
+
public_key=pulumi.get(__response__, 'public_key'),
|
|
291
|
+
serial_number=pulumi.get(__response__, 'serial_number'),
|
|
292
|
+
signed_key=pulumi.get(__response__, 'signed_key'),
|
|
293
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
|
294
|
+
valid_principals=pulumi.get(__response__, 'valid_principals')))
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'SecretBackendRoleAllowedUserKeyConfig',
|
|
19
|
+
]
|
|
20
|
+
|
|
21
|
+
@pulumi.output_type
|
|
22
|
+
class SecretBackendRoleAllowedUserKeyConfig(dict):
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
lengths: Sequence[_builtins.int],
|
|
25
|
+
type: _builtins.str):
|
|
26
|
+
"""
|
|
27
|
+
:param Sequence[_builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
|
|
28
|
+
:param _builtins.str type: Key type, choices:
|
|
29
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
|
30
|
+
"""
|
|
31
|
+
pulumi.set(__self__, "lengths", lengths)
|
|
32
|
+
pulumi.set(__self__, "type", type)
|
|
33
|
+
|
|
34
|
+
@_builtins.property
|
|
35
|
+
@pulumi.getter
|
|
36
|
+
def lengths(self) -> Sequence[_builtins.int]:
|
|
37
|
+
"""
|
|
38
|
+
List of allowed key lengths, vault-1.10 and above
|
|
39
|
+
"""
|
|
40
|
+
return pulumi.get(self, "lengths")
|
|
41
|
+
|
|
42
|
+
@_builtins.property
|
|
43
|
+
@pulumi.getter
|
|
44
|
+
def type(self) -> _builtins.str:
|
|
45
|
+
"""
|
|
46
|
+
Key type, choices:
|
|
47
|
+
rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
|
|
48
|
+
"""
|
|
49
|
+
return pulumi.get(self, "type")
|
|
50
|
+
|
|
51
|
+
|