pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,256 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetCmacResult',
19
+ 'AwaitableGetCmacResult',
20
+ 'get_cmac',
21
+ 'get_cmac_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetCmacResult:
26
+ """
27
+ A collection of values returned by getCmac.
28
+ """
29
+ def __init__(__self__, batch_inputs=None, batch_results=None, cmac=None, id=None, input=None, key_version=None, mac_length=None, name=None, namespace=None, path=None, url_mac_length=None):
30
+ if batch_inputs and not isinstance(batch_inputs, list):
31
+ raise TypeError("Expected argument 'batch_inputs' to be a list")
32
+ pulumi.set(__self__, "batch_inputs", batch_inputs)
33
+ if batch_results and not isinstance(batch_results, list):
34
+ raise TypeError("Expected argument 'batch_results' to be a list")
35
+ pulumi.set(__self__, "batch_results", batch_results)
36
+ if cmac and not isinstance(cmac, str):
37
+ raise TypeError("Expected argument 'cmac' to be a str")
38
+ pulumi.set(__self__, "cmac", cmac)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if input and not isinstance(input, str):
43
+ raise TypeError("Expected argument 'input' to be a str")
44
+ pulumi.set(__self__, "input", input)
45
+ if key_version and not isinstance(key_version, int):
46
+ raise TypeError("Expected argument 'key_version' to be a int")
47
+ pulumi.set(__self__, "key_version", key_version)
48
+ if mac_length and not isinstance(mac_length, int):
49
+ raise TypeError("Expected argument 'mac_length' to be a int")
50
+ pulumi.set(__self__, "mac_length", mac_length)
51
+ if name and not isinstance(name, str):
52
+ raise TypeError("Expected argument 'name' to be a str")
53
+ pulumi.set(__self__, "name", name)
54
+ if namespace and not isinstance(namespace, str):
55
+ raise TypeError("Expected argument 'namespace' to be a str")
56
+ pulumi.set(__self__, "namespace", namespace)
57
+ if path and not isinstance(path, str):
58
+ raise TypeError("Expected argument 'path' to be a str")
59
+ pulumi.set(__self__, "path", path)
60
+ if url_mac_length and not isinstance(url_mac_length, int):
61
+ raise TypeError("Expected argument 'url_mac_length' to be a int")
62
+ pulumi.set(__self__, "url_mac_length", url_mac_length)
63
+
64
+ @_builtins.property
65
+ @pulumi.getter(name="batchInputs")
66
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, _builtins.str]]]:
67
+ return pulumi.get(self, "batch_inputs")
68
+
69
+ @_builtins.property
70
+ @pulumi.getter(name="batchResults")
71
+ def batch_results(self) -> Sequence[Mapping[str, _builtins.str]]:
72
+ """
73
+ The results returned from Vault if using `batch_input`
74
+ """
75
+ return pulumi.get(self, "batch_results")
76
+
77
+ @_builtins.property
78
+ @pulumi.getter
79
+ def cmac(self) -> _builtins.str:
80
+ """
81
+ The CMAC returned from Vault if using `input`
82
+ """
83
+ return pulumi.get(self, "cmac")
84
+
85
+ @_builtins.property
86
+ @pulumi.getter
87
+ def id(self) -> _builtins.str:
88
+ """
89
+ The provider-assigned unique ID for this managed resource.
90
+ """
91
+ return pulumi.get(self, "id")
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def input(self) -> Optional[_builtins.str]:
96
+ return pulumi.get(self, "input")
97
+
98
+ @_builtins.property
99
+ @pulumi.getter(name="keyVersion")
100
+ def key_version(self) -> Optional[_builtins.int]:
101
+ return pulumi.get(self, "key_version")
102
+
103
+ @_builtins.property
104
+ @pulumi.getter(name="macLength")
105
+ def mac_length(self) -> Optional[_builtins.int]:
106
+ return pulumi.get(self, "mac_length")
107
+
108
+ @_builtins.property
109
+ @pulumi.getter
110
+ def name(self) -> _builtins.str:
111
+ return pulumi.get(self, "name")
112
+
113
+ @_builtins.property
114
+ @pulumi.getter
115
+ def namespace(self) -> Optional[_builtins.str]:
116
+ return pulumi.get(self, "namespace")
117
+
118
+ @_builtins.property
119
+ @pulumi.getter
120
+ def path(self) -> _builtins.str:
121
+ return pulumi.get(self, "path")
122
+
123
+ @_builtins.property
124
+ @pulumi.getter(name="urlMacLength")
125
+ def url_mac_length(self) -> Optional[_builtins.int]:
126
+ return pulumi.get(self, "url_mac_length")
127
+
128
+
129
+ class AwaitableGetCmacResult(GetCmacResult):
130
+ # pylint: disable=using-constant-test
131
+ def __await__(self):
132
+ if False:
133
+ yield self
134
+ return GetCmacResult(
135
+ batch_inputs=self.batch_inputs,
136
+ batch_results=self.batch_results,
137
+ cmac=self.cmac,
138
+ id=self.id,
139
+ input=self.input,
140
+ key_version=self.key_version,
141
+ mac_length=self.mac_length,
142
+ name=self.name,
143
+ namespace=self.namespace,
144
+ path=self.path,
145
+ url_mac_length=self.url_mac_length)
146
+
147
+
148
+ def get_cmac(batch_inputs: Optional[Sequence[Mapping[str, _builtins.str]]] = None,
149
+ batch_results: Optional[Sequence[Mapping[str, _builtins.str]]] = None,
150
+ cmac: Optional[_builtins.str] = None,
151
+ input: Optional[_builtins.str] = None,
152
+ key_version: Optional[_builtins.int] = None,
153
+ mac_length: Optional[_builtins.int] = None,
154
+ name: Optional[_builtins.str] = None,
155
+ namespace: Optional[_builtins.str] = None,
156
+ path: Optional[_builtins.str] = None,
157
+ url_mac_length: Optional[_builtins.int] = None,
158
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetCmacResult:
159
+ """
160
+ This is a data source which can be used to generate a CMAC using a Vault Transit key.
161
+
162
+ ## Example Usage
163
+
164
+ ```python
165
+ import pulumi
166
+ import pulumi_vault as vault
167
+
168
+ test = vault.transit.get_cmac(path="transit",
169
+ name="test",
170
+ input="aGVsbG8gd29ybGQ=")
171
+ ```
172
+
173
+
174
+ :param Sequence[Mapping[str, _builtins.str]] batch_results: The results returned from Vault if using `batch_input`
175
+ :param _builtins.str cmac: The CMAC returned from Vault if using `input`
176
+ """
177
+ __args__ = dict()
178
+ __args__['batchInputs'] = batch_inputs
179
+ __args__['batchResults'] = batch_results
180
+ __args__['cmac'] = cmac
181
+ __args__['input'] = input
182
+ __args__['keyVersion'] = key_version
183
+ __args__['macLength'] = mac_length
184
+ __args__['name'] = name
185
+ __args__['namespace'] = namespace
186
+ __args__['path'] = path
187
+ __args__['urlMacLength'] = url_mac_length
188
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
189
+ __ret__ = pulumi.runtime.invoke('vault:transit/getCmac:getCmac', __args__, opts=opts, typ=GetCmacResult).value
190
+
191
+ return AwaitableGetCmacResult(
192
+ batch_inputs=pulumi.get(__ret__, 'batch_inputs'),
193
+ batch_results=pulumi.get(__ret__, 'batch_results'),
194
+ cmac=pulumi.get(__ret__, 'cmac'),
195
+ id=pulumi.get(__ret__, 'id'),
196
+ input=pulumi.get(__ret__, 'input'),
197
+ key_version=pulumi.get(__ret__, 'key_version'),
198
+ mac_length=pulumi.get(__ret__, 'mac_length'),
199
+ name=pulumi.get(__ret__, 'name'),
200
+ namespace=pulumi.get(__ret__, 'namespace'),
201
+ path=pulumi.get(__ret__, 'path'),
202
+ url_mac_length=pulumi.get(__ret__, 'url_mac_length'))
203
+ def get_cmac_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, _builtins.str]]]]] = None,
204
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, _builtins.str]]]]] = None,
205
+ cmac: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
206
+ input: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
207
+ key_version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
208
+ mac_length: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
209
+ name: Optional[pulumi.Input[_builtins.str]] = None,
210
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
211
+ path: Optional[pulumi.Input[_builtins.str]] = None,
212
+ url_mac_length: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
213
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetCmacResult]:
214
+ """
215
+ This is a data source which can be used to generate a CMAC using a Vault Transit key.
216
+
217
+ ## Example Usage
218
+
219
+ ```python
220
+ import pulumi
221
+ import pulumi_vault as vault
222
+
223
+ test = vault.transit.get_cmac(path="transit",
224
+ name="test",
225
+ input="aGVsbG8gd29ybGQ=")
226
+ ```
227
+
228
+
229
+ :param Sequence[Mapping[str, _builtins.str]] batch_results: The results returned from Vault if using `batch_input`
230
+ :param _builtins.str cmac: The CMAC returned from Vault if using `input`
231
+ """
232
+ __args__ = dict()
233
+ __args__['batchInputs'] = batch_inputs
234
+ __args__['batchResults'] = batch_results
235
+ __args__['cmac'] = cmac
236
+ __args__['input'] = input
237
+ __args__['keyVersion'] = key_version
238
+ __args__['macLength'] = mac_length
239
+ __args__['name'] = name
240
+ __args__['namespace'] = namespace
241
+ __args__['path'] = path
242
+ __args__['urlMacLength'] = url_mac_length
243
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
244
+ __ret__ = pulumi.runtime.invoke_output('vault:transit/getCmac:getCmac', __args__, opts=opts, typ=GetCmacResult)
245
+ return __ret__.apply(lambda __response__: GetCmacResult(
246
+ batch_inputs=pulumi.get(__response__, 'batch_inputs'),
247
+ batch_results=pulumi.get(__response__, 'batch_results'),
248
+ cmac=pulumi.get(__response__, 'cmac'),
249
+ id=pulumi.get(__response__, 'id'),
250
+ input=pulumi.get(__response__, 'input'),
251
+ key_version=pulumi.get(__response__, 'key_version'),
252
+ mac_length=pulumi.get(__response__, 'mac_length'),
253
+ name=pulumi.get(__response__, 'name'),
254
+ namespace=pulumi.get(__response__, 'namespace'),
255
+ path=pulumi.get(__response__, 'path'),
256
+ url_mac_length=pulumi.get(__response__, 'url_mac_length')))
@@ -0,0 +1,181 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetDecryptResult',
19
+ 'AwaitableGetDecryptResult',
20
+ 'get_decrypt',
21
+ 'get_decrypt_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetDecryptResult:
26
+ """
27
+ A collection of values returned by getDecrypt.
28
+ """
29
+ def __init__(__self__, backend=None, ciphertext=None, context=None, id=None, key=None, namespace=None, plaintext=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if ciphertext and not isinstance(ciphertext, str):
34
+ raise TypeError("Expected argument 'ciphertext' to be a str")
35
+ pulumi.set(__self__, "ciphertext", ciphertext)
36
+ if context and not isinstance(context, str):
37
+ raise TypeError("Expected argument 'context' to be a str")
38
+ pulumi.set(__self__, "context", context)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if key and not isinstance(key, str):
43
+ raise TypeError("Expected argument 'key' to be a str")
44
+ pulumi.set(__self__, "key", key)
45
+ if namespace and not isinstance(namespace, str):
46
+ raise TypeError("Expected argument 'namespace' to be a str")
47
+ pulumi.set(__self__, "namespace", namespace)
48
+ if plaintext and not isinstance(plaintext, str):
49
+ raise TypeError("Expected argument 'plaintext' to be a str")
50
+ pulumi.set(__self__, "plaintext", plaintext)
51
+
52
+ @_builtins.property
53
+ @pulumi.getter
54
+ def backend(self) -> _builtins.str:
55
+ return pulumi.get(self, "backend")
56
+
57
+ @_builtins.property
58
+ @pulumi.getter
59
+ def ciphertext(self) -> _builtins.str:
60
+ return pulumi.get(self, "ciphertext")
61
+
62
+ @_builtins.property
63
+ @pulumi.getter
64
+ def context(self) -> Optional[_builtins.str]:
65
+ return pulumi.get(self, "context")
66
+
67
+ @_builtins.property
68
+ @pulumi.getter
69
+ def id(self) -> _builtins.str:
70
+ """
71
+ The provider-assigned unique ID for this managed resource.
72
+ """
73
+ return pulumi.get(self, "id")
74
+
75
+ @_builtins.property
76
+ @pulumi.getter
77
+ def key(self) -> _builtins.str:
78
+ return pulumi.get(self, "key")
79
+
80
+ @_builtins.property
81
+ @pulumi.getter
82
+ def namespace(self) -> Optional[_builtins.str]:
83
+ return pulumi.get(self, "namespace")
84
+
85
+ @_builtins.property
86
+ @pulumi.getter
87
+ def plaintext(self) -> _builtins.str:
88
+ """
89
+ Decrypted plaintext returned from Vault
90
+ """
91
+ return pulumi.get(self, "plaintext")
92
+
93
+
94
+ class AwaitableGetDecryptResult(GetDecryptResult):
95
+ # pylint: disable=using-constant-test
96
+ def __await__(self):
97
+ if False:
98
+ yield self
99
+ return GetDecryptResult(
100
+ backend=self.backend,
101
+ ciphertext=self.ciphertext,
102
+ context=self.context,
103
+ id=self.id,
104
+ key=self.key,
105
+ namespace=self.namespace,
106
+ plaintext=self.plaintext)
107
+
108
+
109
+ def get_decrypt(backend: Optional[_builtins.str] = None,
110
+ ciphertext: Optional[_builtins.str] = None,
111
+ context: Optional[_builtins.str] = None,
112
+ key: Optional[_builtins.str] = None,
113
+ namespace: Optional[_builtins.str] = None,
114
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDecryptResult:
115
+ """
116
+ This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
117
+
118
+ ## Example Usage
119
+
120
+ ```python
121
+ import pulumi
122
+ import pulumi_vault as vault
123
+
124
+ test = vault.transit.get_decrypt(backend="transit",
125
+ key="test",
126
+ ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
127
+ ```
128
+ """
129
+ __args__ = dict()
130
+ __args__['backend'] = backend
131
+ __args__['ciphertext'] = ciphertext
132
+ __args__['context'] = context
133
+ __args__['key'] = key
134
+ __args__['namespace'] = namespace
135
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
136
+ __ret__ = pulumi.runtime.invoke('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult).value
137
+
138
+ return AwaitableGetDecryptResult(
139
+ backend=pulumi.get(__ret__, 'backend'),
140
+ ciphertext=pulumi.get(__ret__, 'ciphertext'),
141
+ context=pulumi.get(__ret__, 'context'),
142
+ id=pulumi.get(__ret__, 'id'),
143
+ key=pulumi.get(__ret__, 'key'),
144
+ namespace=pulumi.get(__ret__, 'namespace'),
145
+ plaintext=pulumi.get(__ret__, 'plaintext'))
146
+ def get_decrypt_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
147
+ ciphertext: Optional[pulumi.Input[_builtins.str]] = None,
148
+ context: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
149
+ key: Optional[pulumi.Input[_builtins.str]] = None,
150
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
151
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecryptResult]:
152
+ """
153
+ This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
154
+
155
+ ## Example Usage
156
+
157
+ ```python
158
+ import pulumi
159
+ import pulumi_vault as vault
160
+
161
+ test = vault.transit.get_decrypt(backend="transit",
162
+ key="test",
163
+ ciphertext="vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==")
164
+ ```
165
+ """
166
+ __args__ = dict()
167
+ __args__['backend'] = backend
168
+ __args__['ciphertext'] = ciphertext
169
+ __args__['context'] = context
170
+ __args__['key'] = key
171
+ __args__['namespace'] = namespace
172
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
173
+ __ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult)
174
+ return __ret__.apply(lambda __response__: GetDecryptResult(
175
+ backend=pulumi.get(__response__, 'backend'),
176
+ ciphertext=pulumi.get(__response__, 'ciphertext'),
177
+ context=pulumi.get(__response__, 'context'),
178
+ id=pulumi.get(__response__, 'id'),
179
+ key=pulumi.get(__response__, 'key'),
180
+ namespace=pulumi.get(__response__, 'namespace'),
181
+ plaintext=pulumi.get(__response__, 'plaintext')))
@@ -0,0 +1,174 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetEncryptResult',
19
+ 'AwaitableGetEncryptResult',
20
+ 'get_encrypt',
21
+ 'get_encrypt_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetEncryptResult:
26
+ """
27
+ A collection of values returned by getEncrypt.
28
+ """
29
+ def __init__(__self__, backend=None, ciphertext=None, context=None, id=None, key=None, key_version=None, namespace=None, plaintext=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if ciphertext and not isinstance(ciphertext, str):
34
+ raise TypeError("Expected argument 'ciphertext' to be a str")
35
+ pulumi.set(__self__, "ciphertext", ciphertext)
36
+ if context and not isinstance(context, str):
37
+ raise TypeError("Expected argument 'context' to be a str")
38
+ pulumi.set(__self__, "context", context)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if key and not isinstance(key, str):
43
+ raise TypeError("Expected argument 'key' to be a str")
44
+ pulumi.set(__self__, "key", key)
45
+ if key_version and not isinstance(key_version, int):
46
+ raise TypeError("Expected argument 'key_version' to be a int")
47
+ pulumi.set(__self__, "key_version", key_version)
48
+ if namespace and not isinstance(namespace, str):
49
+ raise TypeError("Expected argument 'namespace' to be a str")
50
+ pulumi.set(__self__, "namespace", namespace)
51
+ if plaintext and not isinstance(plaintext, str):
52
+ raise TypeError("Expected argument 'plaintext' to be a str")
53
+ pulumi.set(__self__, "plaintext", plaintext)
54
+
55
+ @_builtins.property
56
+ @pulumi.getter
57
+ def backend(self) -> _builtins.str:
58
+ return pulumi.get(self, "backend")
59
+
60
+ @_builtins.property
61
+ @pulumi.getter
62
+ def ciphertext(self) -> _builtins.str:
63
+ """
64
+ Encrypted ciphertext returned from Vault
65
+ """
66
+ return pulumi.get(self, "ciphertext")
67
+
68
+ @_builtins.property
69
+ @pulumi.getter
70
+ def context(self) -> Optional[_builtins.str]:
71
+ return pulumi.get(self, "context")
72
+
73
+ @_builtins.property
74
+ @pulumi.getter
75
+ def id(self) -> _builtins.str:
76
+ """
77
+ The provider-assigned unique ID for this managed resource.
78
+ """
79
+ return pulumi.get(self, "id")
80
+
81
+ @_builtins.property
82
+ @pulumi.getter
83
+ def key(self) -> _builtins.str:
84
+ return pulumi.get(self, "key")
85
+
86
+ @_builtins.property
87
+ @pulumi.getter(name="keyVersion")
88
+ def key_version(self) -> Optional[_builtins.int]:
89
+ return pulumi.get(self, "key_version")
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def namespace(self) -> Optional[_builtins.str]:
94
+ return pulumi.get(self, "namespace")
95
+
96
+ @_builtins.property
97
+ @pulumi.getter
98
+ def plaintext(self) -> _builtins.str:
99
+ return pulumi.get(self, "plaintext")
100
+
101
+
102
+ class AwaitableGetEncryptResult(GetEncryptResult):
103
+ # pylint: disable=using-constant-test
104
+ def __await__(self):
105
+ if False:
106
+ yield self
107
+ return GetEncryptResult(
108
+ backend=self.backend,
109
+ ciphertext=self.ciphertext,
110
+ context=self.context,
111
+ id=self.id,
112
+ key=self.key,
113
+ key_version=self.key_version,
114
+ namespace=self.namespace,
115
+ plaintext=self.plaintext)
116
+
117
+
118
+ def get_encrypt(backend: Optional[_builtins.str] = None,
119
+ context: Optional[_builtins.str] = None,
120
+ key: Optional[_builtins.str] = None,
121
+ key_version: Optional[_builtins.int] = None,
122
+ namespace: Optional[_builtins.str] = None,
123
+ plaintext: Optional[_builtins.str] = None,
124
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetEncryptResult:
125
+ """
126
+ This is a data source which can be used to encrypt plaintext using a Vault Transit key.
127
+ """
128
+ __args__ = dict()
129
+ __args__['backend'] = backend
130
+ __args__['context'] = context
131
+ __args__['key'] = key
132
+ __args__['keyVersion'] = key_version
133
+ __args__['namespace'] = namespace
134
+ __args__['plaintext'] = plaintext
135
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
136
+ __ret__ = pulumi.runtime.invoke('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult).value
137
+
138
+ return AwaitableGetEncryptResult(
139
+ backend=pulumi.get(__ret__, 'backend'),
140
+ ciphertext=pulumi.get(__ret__, 'ciphertext'),
141
+ context=pulumi.get(__ret__, 'context'),
142
+ id=pulumi.get(__ret__, 'id'),
143
+ key=pulumi.get(__ret__, 'key'),
144
+ key_version=pulumi.get(__ret__, 'key_version'),
145
+ namespace=pulumi.get(__ret__, 'namespace'),
146
+ plaintext=pulumi.get(__ret__, 'plaintext'))
147
+ def get_encrypt_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
148
+ context: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
149
+ key: Optional[pulumi.Input[_builtins.str]] = None,
150
+ key_version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
152
+ plaintext: Optional[pulumi.Input[_builtins.str]] = None,
153
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncryptResult]:
154
+ """
155
+ This is a data source which can be used to encrypt plaintext using a Vault Transit key.
156
+ """
157
+ __args__ = dict()
158
+ __args__['backend'] = backend
159
+ __args__['context'] = context
160
+ __args__['key'] = key
161
+ __args__['keyVersion'] = key_version
162
+ __args__['namespace'] = namespace
163
+ __args__['plaintext'] = plaintext
164
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
165
+ __ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult)
166
+ return __ret__.apply(lambda __response__: GetEncryptResult(
167
+ backend=pulumi.get(__response__, 'backend'),
168
+ ciphertext=pulumi.get(__response__, 'ciphertext'),
169
+ context=pulumi.get(__response__, 'context'),
170
+ id=pulumi.get(__response__, 'id'),
171
+ key=pulumi.get(__response__, 'key'),
172
+ key_version=pulumi.get(__response__, 'key_version'),
173
+ namespace=pulumi.get(__response__, 'namespace'),
174
+ plaintext=pulumi.get(__response__, 'plaintext')))