pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,76 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'SecretBackendRoleAllowedUserKeyConfigArgs',
19
+ 'SecretBackendRoleAllowedUserKeyConfigArgsDict',
20
+ ]
21
+
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
26
+ lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]
27
+ """
28
+ List of allowed key lengths, vault-1.10 and above
29
+ """
30
+ type: pulumi.Input[_builtins.str]
31
+ """
32
+ Key type, choices:
33
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
34
+ """
35
+ elif False:
36
+ SecretBackendRoleAllowedUserKeyConfigArgsDict: TypeAlias = Mapping[str, Any]
37
+
38
+ @pulumi.input_type
39
+ class SecretBackendRoleAllowedUserKeyConfigArgs:
40
+ def __init__(__self__, *,
41
+ lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]],
42
+ type: pulumi.Input[_builtins.str]):
43
+ """
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.int]]] lengths: List of allowed key lengths, vault-1.10 and above
45
+ :param pulumi.Input[_builtins.str] type: Key type, choices:
46
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
47
+ """
48
+ pulumi.set(__self__, "lengths", lengths)
49
+ pulumi.set(__self__, "type", type)
50
+
51
+ @_builtins.property
52
+ @pulumi.getter
53
+ def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]:
54
+ """
55
+ List of allowed key lengths, vault-1.10 and above
56
+ """
57
+ return pulumi.get(self, "lengths")
58
+
59
+ @lengths.setter
60
+ def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]):
61
+ pulumi.set(self, "lengths", value)
62
+
63
+ @_builtins.property
64
+ @pulumi.getter
65
+ def type(self) -> pulumi.Input[_builtins.str]:
66
+ """
67
+ Key type, choices:
68
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
69
+ """
70
+ return pulumi.get(self, "type")
71
+
72
+ @type.setter
73
+ def type(self, value: pulumi.Input[_builtins.str]):
74
+ pulumi.set(self, "type", value)
75
+
76
+
@@ -0,0 +1,294 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetSecretBackendSignResult',
19
+ 'AwaitableGetSecretBackendSignResult',
20
+ 'get_secret_backend_sign',
21
+ 'get_secret_backend_sign_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetSecretBackendSignResult:
26
+ """
27
+ A collection of values returned by getSecretBackendSign.
28
+ """
29
+ def __init__(__self__, cert_type=None, critical_options=None, extensions=None, id=None, key_id=None, name=None, namespace=None, path=None, public_key=None, serial_number=None, signed_key=None, ttl=None, valid_principals=None):
30
+ if cert_type and not isinstance(cert_type, str):
31
+ raise TypeError("Expected argument 'cert_type' to be a str")
32
+ pulumi.set(__self__, "cert_type", cert_type)
33
+ if critical_options and not isinstance(critical_options, dict):
34
+ raise TypeError("Expected argument 'critical_options' to be a dict")
35
+ pulumi.set(__self__, "critical_options", critical_options)
36
+ if extensions and not isinstance(extensions, dict):
37
+ raise TypeError("Expected argument 'extensions' to be a dict")
38
+ pulumi.set(__self__, "extensions", extensions)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if key_id and not isinstance(key_id, str):
43
+ raise TypeError("Expected argument 'key_id' to be a str")
44
+ pulumi.set(__self__, "key_id", key_id)
45
+ if name and not isinstance(name, str):
46
+ raise TypeError("Expected argument 'name' to be a str")
47
+ pulumi.set(__self__, "name", name)
48
+ if namespace and not isinstance(namespace, str):
49
+ raise TypeError("Expected argument 'namespace' to be a str")
50
+ pulumi.set(__self__, "namespace", namespace)
51
+ if path and not isinstance(path, str):
52
+ raise TypeError("Expected argument 'path' to be a str")
53
+ pulumi.set(__self__, "path", path)
54
+ if public_key and not isinstance(public_key, str):
55
+ raise TypeError("Expected argument 'public_key' to be a str")
56
+ pulumi.set(__self__, "public_key", public_key)
57
+ if serial_number and not isinstance(serial_number, str):
58
+ raise TypeError("Expected argument 'serial_number' to be a str")
59
+ pulumi.set(__self__, "serial_number", serial_number)
60
+ if signed_key and not isinstance(signed_key, str):
61
+ raise TypeError("Expected argument 'signed_key' to be a str")
62
+ pulumi.set(__self__, "signed_key", signed_key)
63
+ if ttl and not isinstance(ttl, str):
64
+ raise TypeError("Expected argument 'ttl' to be a str")
65
+ pulumi.set(__self__, "ttl", ttl)
66
+ if valid_principals and not isinstance(valid_principals, str):
67
+ raise TypeError("Expected argument 'valid_principals' to be a str")
68
+ pulumi.set(__self__, "valid_principals", valid_principals)
69
+
70
+ @_builtins.property
71
+ @pulumi.getter(name="certType")
72
+ def cert_type(self) -> Optional[_builtins.str]:
73
+ return pulumi.get(self, "cert_type")
74
+
75
+ @_builtins.property
76
+ @pulumi.getter(name="criticalOptions")
77
+ def critical_options(self) -> Optional[Mapping[str, _builtins.str]]:
78
+ return pulumi.get(self, "critical_options")
79
+
80
+ @_builtins.property
81
+ @pulumi.getter
82
+ def extensions(self) -> Optional[Mapping[str, _builtins.str]]:
83
+ return pulumi.get(self, "extensions")
84
+
85
+ @_builtins.property
86
+ @pulumi.getter
87
+ def id(self) -> _builtins.str:
88
+ """
89
+ The provider-assigned unique ID for this managed resource.
90
+ """
91
+ return pulumi.get(self, "id")
92
+
93
+ @_builtins.property
94
+ @pulumi.getter(name="keyId")
95
+ def key_id(self) -> Optional[_builtins.str]:
96
+ return pulumi.get(self, "key_id")
97
+
98
+ @_builtins.property
99
+ @pulumi.getter
100
+ def name(self) -> _builtins.str:
101
+ return pulumi.get(self, "name")
102
+
103
+ @_builtins.property
104
+ @pulumi.getter
105
+ def namespace(self) -> Optional[_builtins.str]:
106
+ return pulumi.get(self, "namespace")
107
+
108
+ @_builtins.property
109
+ @pulumi.getter
110
+ def path(self) -> _builtins.str:
111
+ return pulumi.get(self, "path")
112
+
113
+ @_builtins.property
114
+ @pulumi.getter(name="publicKey")
115
+ def public_key(self) -> _builtins.str:
116
+ return pulumi.get(self, "public_key")
117
+
118
+ @_builtins.property
119
+ @pulumi.getter(name="serialNumber")
120
+ def serial_number(self) -> _builtins.str:
121
+ """
122
+ The serial number of the certificate returned from Vault
123
+ """
124
+ return pulumi.get(self, "serial_number")
125
+
126
+ @_builtins.property
127
+ @pulumi.getter(name="signedKey")
128
+ def signed_key(self) -> _builtins.str:
129
+ """
130
+ The signed certificate returned from Vault
131
+ """
132
+ return pulumi.get(self, "signed_key")
133
+
134
+ @_builtins.property
135
+ @pulumi.getter
136
+ def ttl(self) -> Optional[_builtins.str]:
137
+ return pulumi.get(self, "ttl")
138
+
139
+ @_builtins.property
140
+ @pulumi.getter(name="validPrincipals")
141
+ def valid_principals(self) -> Optional[_builtins.str]:
142
+ return pulumi.get(self, "valid_principals")
143
+
144
+
145
+ class AwaitableGetSecretBackendSignResult(GetSecretBackendSignResult):
146
+ # pylint: disable=using-constant-test
147
+ def __await__(self):
148
+ if False:
149
+ yield self
150
+ return GetSecretBackendSignResult(
151
+ cert_type=self.cert_type,
152
+ critical_options=self.critical_options,
153
+ extensions=self.extensions,
154
+ id=self.id,
155
+ key_id=self.key_id,
156
+ name=self.name,
157
+ namespace=self.namespace,
158
+ path=self.path,
159
+ public_key=self.public_key,
160
+ serial_number=self.serial_number,
161
+ signed_key=self.signed_key,
162
+ ttl=self.ttl,
163
+ valid_principals=self.valid_principals)
164
+
165
+
166
+ def get_secret_backend_sign(cert_type: Optional[_builtins.str] = None,
167
+ critical_options: Optional[Mapping[str, _builtins.str]] = None,
168
+ extensions: Optional[Mapping[str, _builtins.str]] = None,
169
+ key_id: Optional[_builtins.str] = None,
170
+ name: Optional[_builtins.str] = None,
171
+ namespace: Optional[_builtins.str] = None,
172
+ path: Optional[_builtins.str] = None,
173
+ public_key: Optional[_builtins.str] = None,
174
+ ttl: Optional[_builtins.str] = None,
175
+ valid_principals: Optional[_builtins.str] = None,
176
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretBackendSignResult:
177
+ """
178
+ This is a data source which can be used to sign an SSH public key
179
+
180
+ ## Example Usage
181
+
182
+ ```python
183
+ import pulumi
184
+ import pulumi_vault as vault
185
+
186
+ test = vault.ssh.get_secret_backend_sign(path="ssh",
187
+ public_key="ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDR6q4PTcuIkpdGEqaCaxnR8/REqlbSiEIKaRZkVSjiTXOaiSfUsy9cY2+7+oO9fLMUrhylImerjzEoagX1IjYvc9IeUBaRnfacN7QwUDfstgp2jknbg7rNX9j9nFxwltV/jYQPcRq8Ud0wn1nb4qixq+diM7+Up+xJOeaKxbpjEUJH5dcvaBB+Aa24tJpjOQxtFyQ6dUxlgJu0tcygZR92kKYCVjZDohlSED3i/Ak2KFwqCKx2IZWq9z1vMEgmRzv++4Qt1OsbpW8itiCyWn6lmV33eDCdjMrr9TEThQNnMinPrHdmVUnPZ/OomP+rLDRE9lQR16uaSvKhg5TWOFIXRPyEhX9arEATrE4KSWeQN2qgHOb6P24YqgEm1ZdHJq25q/nBBAa1x0tFMiWqZwOsGeJ9nTeOeyiqFKH5YRBo6DIy3ag3taFsfQSve6oqjnrudUd1hJ8/bNSz8amECfP0ULvAEAgpiurj3eCPc3OcXl4tAld9F6KwabEJV5eelcs= user@example.com",
188
+ name="test",
189
+ valid_principals="my-user")
190
+ ```
191
+
192
+
193
+ :param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
194
+ :param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
195
+ :param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
196
+ :param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
197
+ :param _builtins.str name: Specifies the name of the role to sign.
198
+ :param _builtins.str path: Full path where SSH backend is mounted.
199
+ :param _builtins.str public_key: Specifies the SSH public key that should be signed.
200
+ :param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
201
+ :param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
202
+ """
203
+ __args__ = dict()
204
+ __args__['certType'] = cert_type
205
+ __args__['criticalOptions'] = critical_options
206
+ __args__['extensions'] = extensions
207
+ __args__['keyId'] = key_id
208
+ __args__['name'] = name
209
+ __args__['namespace'] = namespace
210
+ __args__['path'] = path
211
+ __args__['publicKey'] = public_key
212
+ __args__['ttl'] = ttl
213
+ __args__['validPrincipals'] = valid_principals
214
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke('vault:ssh/getSecretBackendSign:getSecretBackendSign', __args__, opts=opts, typ=GetSecretBackendSignResult).value
216
+
217
+ return AwaitableGetSecretBackendSignResult(
218
+ cert_type=pulumi.get(__ret__, 'cert_type'),
219
+ critical_options=pulumi.get(__ret__, 'critical_options'),
220
+ extensions=pulumi.get(__ret__, 'extensions'),
221
+ id=pulumi.get(__ret__, 'id'),
222
+ key_id=pulumi.get(__ret__, 'key_id'),
223
+ name=pulumi.get(__ret__, 'name'),
224
+ namespace=pulumi.get(__ret__, 'namespace'),
225
+ path=pulumi.get(__ret__, 'path'),
226
+ public_key=pulumi.get(__ret__, 'public_key'),
227
+ serial_number=pulumi.get(__ret__, 'serial_number'),
228
+ signed_key=pulumi.get(__ret__, 'signed_key'),
229
+ ttl=pulumi.get(__ret__, 'ttl'),
230
+ valid_principals=pulumi.get(__ret__, 'valid_principals'))
231
+ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
232
+ critical_options: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
233
+ extensions: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
234
+ key_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
235
+ name: Optional[pulumi.Input[_builtins.str]] = None,
236
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
237
+ path: Optional[pulumi.Input[_builtins.str]] = None,
238
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
239
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
240
+ valid_principals: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
241
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretBackendSignResult]:
242
+ """
243
+ This is a data source which can be used to sign an SSH public key
244
+
245
+ ## Example Usage
246
+
247
+ ```python
248
+ import pulumi
249
+ import pulumi_vault as vault
250
+
251
+ test = vault.ssh.get_secret_backend_sign(path="ssh",
252
+ public_key="ssh-rsa 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 user@example.com",
253
+ name="test",
254
+ valid_principals="my-user")
255
+ ```
256
+
257
+
258
+ :param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
259
+ :param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
260
+ :param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
261
+ :param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
262
+ :param _builtins.str name: Specifies the name of the role to sign.
263
+ :param _builtins.str path: Full path where SSH backend is mounted.
264
+ :param _builtins.str public_key: Specifies the SSH public key that should be signed.
265
+ :param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
266
+ :param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
267
+ """
268
+ __args__ = dict()
269
+ __args__['certType'] = cert_type
270
+ __args__['criticalOptions'] = critical_options
271
+ __args__['extensions'] = extensions
272
+ __args__['keyId'] = key_id
273
+ __args__['name'] = name
274
+ __args__['namespace'] = namespace
275
+ __args__['path'] = path
276
+ __args__['publicKey'] = public_key
277
+ __args__['ttl'] = ttl
278
+ __args__['validPrincipals'] = valid_principals
279
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
280
+ __ret__ = pulumi.runtime.invoke_output('vault:ssh/getSecretBackendSign:getSecretBackendSign', __args__, opts=opts, typ=GetSecretBackendSignResult)
281
+ return __ret__.apply(lambda __response__: GetSecretBackendSignResult(
282
+ cert_type=pulumi.get(__response__, 'cert_type'),
283
+ critical_options=pulumi.get(__response__, 'critical_options'),
284
+ extensions=pulumi.get(__response__, 'extensions'),
285
+ id=pulumi.get(__response__, 'id'),
286
+ key_id=pulumi.get(__response__, 'key_id'),
287
+ name=pulumi.get(__response__, 'name'),
288
+ namespace=pulumi.get(__response__, 'namespace'),
289
+ path=pulumi.get(__response__, 'path'),
290
+ public_key=pulumi.get(__response__, 'public_key'),
291
+ serial_number=pulumi.get(__response__, 'serial_number'),
292
+ signed_key=pulumi.get(__response__, 'signed_key'),
293
+ ttl=pulumi.get(__response__, 'ttl'),
294
+ valid_principals=pulumi.get(__response__, 'valid_principals')))
@@ -0,0 +1,51 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'SecretBackendRoleAllowedUserKeyConfig',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class SecretBackendRoleAllowedUserKeyConfig(dict):
23
+ def __init__(__self__, *,
24
+ lengths: Sequence[_builtins.int],
25
+ type: _builtins.str):
26
+ """
27
+ :param Sequence[_builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
28
+ :param _builtins.str type: Key type, choices:
29
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
30
+ """
31
+ pulumi.set(__self__, "lengths", lengths)
32
+ pulumi.set(__self__, "type", type)
33
+
34
+ @_builtins.property
35
+ @pulumi.getter
36
+ def lengths(self) -> Sequence[_builtins.int]:
37
+ """
38
+ List of allowed key lengths, vault-1.10 and above
39
+ """
40
+ return pulumi.get(self, "lengths")
41
+
42
+ @_builtins.property
43
+ @pulumi.getter
44
+ def type(self) -> _builtins.str:
45
+ """
46
+ Key type, choices:
47
+ rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
48
+ """
49
+ return pulumi.get(self, "type")
50
+
51
+