pulumi-vault 5.19.0a1705621752__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +176 -0
- pulumi_vault/database/outputs.py +168 -0
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +7 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +43 -35
- {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705621752.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
@@ -199,16 +199,16 @@ class GroupAlias(pulumi.CustomResource):
|
|
199
199
|
|
200
200
|
## Import
|
201
201
|
|
202
|
-
The group alias can be imported with the group alias `id`, for example
|
202
|
+
The group alias can be imported with the group alias `id`, for example:
|
203
203
|
|
204
204
|
```sh
|
205
|
-
|
205
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
|
206
206
|
```
|
207
207
|
|
208
208
|
Group aliases can also be imported using the UUID of the alias record, e.g.
|
209
209
|
|
210
210
|
```sh
|
211
|
-
|
211
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
|
212
212
|
```
|
213
213
|
|
214
214
|
:param str resource_name: The name of the resource.
|
@@ -252,16 +252,16 @@ class GroupAlias(pulumi.CustomResource):
|
|
252
252
|
|
253
253
|
## Import
|
254
254
|
|
255
|
-
The group alias can be imported with the group alias `id`, for example
|
255
|
+
The group alias can be imported with the group alias `id`, for example:
|
256
256
|
|
257
257
|
```sh
|
258
|
-
|
258
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
|
259
259
|
```
|
260
260
|
|
261
261
|
Group aliases can also be imported using the UUID of the alias record, e.g.
|
262
262
|
|
263
263
|
```sh
|
264
|
-
|
264
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
|
265
265
|
```
|
266
266
|
|
267
267
|
:param str resource_name: The name of the resource.
|
@@ -633,10 +633,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
633
633
|
|
634
634
|
## Import
|
635
635
|
|
636
|
-
The Kubernetes secret backend role can be imported using the full path to the role
|
636
|
+
The Kubernetes secret backend role can be imported using the full path to the role
|
637
|
+
|
638
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
637
639
|
|
638
640
|
```sh
|
639
|
-
|
641
|
+
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
640
642
|
```
|
641
643
|
|
642
644
|
:param str resource_name: The name of the resource.
|
@@ -777,10 +779,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
777
779
|
|
778
780
|
## Import
|
779
781
|
|
780
|
-
The Kubernetes secret backend role can be imported using the full path to the role
|
782
|
+
The Kubernetes secret backend role can be imported using the full path to the role
|
783
|
+
|
784
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
781
785
|
|
782
786
|
```sh
|
783
|
-
|
787
|
+
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
784
788
|
```
|
785
789
|
|
786
790
|
:param str resource_name: The name of the resource.
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -21,10 +21,13 @@ class SecretV2CustomMetadataArgs:
|
|
21
21
|
delete_version_after: Optional[pulumi.Input[int]] = None,
|
22
22
|
max_versions: Optional[pulumi.Input[int]] = None):
|
23
23
|
"""
|
24
|
+
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
24
25
|
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
25
26
|
Vault and whose values are the corresponding values. This map can only
|
26
27
|
represent string data, so any non-string values returned from Vault are
|
27
28
|
serialized as JSON.
|
29
|
+
:param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
|
30
|
+
:param pulumi.Input[int] max_versions: The number of versions to keep per key.
|
28
31
|
"""
|
29
32
|
if cas_required is not None:
|
30
33
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -38,6 +41,9 @@ class SecretV2CustomMetadataArgs:
|
|
38
41
|
@property
|
39
42
|
@pulumi.getter(name="casRequired")
|
40
43
|
def cas_required(self) -> Optional[pulumi.Input[bool]]:
|
44
|
+
"""
|
45
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
46
|
+
"""
|
41
47
|
return pulumi.get(self, "cas_required")
|
42
48
|
|
43
49
|
@cas_required.setter
|
@@ -62,6 +68,9 @@ class SecretV2CustomMetadataArgs:
|
|
62
68
|
@property
|
63
69
|
@pulumi.getter(name="deleteVersionAfter")
|
64
70
|
def delete_version_after(self) -> Optional[pulumi.Input[int]]:
|
71
|
+
"""
|
72
|
+
If set, specifies the length of time before a version is deleted.
|
73
|
+
"""
|
65
74
|
return pulumi.get(self, "delete_version_after")
|
66
75
|
|
67
76
|
@delete_version_after.setter
|
@@ -71,6 +80,9 @@ class SecretV2CustomMetadataArgs:
|
|
71
80
|
@property
|
72
81
|
@pulumi.getter(name="maxVersions")
|
73
82
|
def max_versions(self) -> Optional[pulumi.Input[int]]:
|
83
|
+
"""
|
84
|
+
The number of versions to keep per key.
|
85
|
+
"""
|
74
86
|
return pulumi.get(self, "max_versions")
|
75
87
|
|
76
88
|
@max_versions.setter
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -42,10 +42,13 @@ class SecretV2CustomMetadata(dict):
|
|
42
42
|
delete_version_after: Optional[int] = None,
|
43
43
|
max_versions: Optional[int] = None):
|
44
44
|
"""
|
45
|
+
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
45
46
|
:param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
|
46
47
|
Vault and whose values are the corresponding values. This map can only
|
47
48
|
represent string data, so any non-string values returned from Vault are
|
48
49
|
serialized as JSON.
|
50
|
+
:param int delete_version_after: If set, specifies the length of time before a version is deleted.
|
51
|
+
:param int max_versions: The number of versions to keep per key.
|
49
52
|
"""
|
50
53
|
if cas_required is not None:
|
51
54
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -59,6 +62,9 @@ class SecretV2CustomMetadata(dict):
|
|
59
62
|
@property
|
60
63
|
@pulumi.getter(name="casRequired")
|
61
64
|
def cas_required(self) -> Optional[bool]:
|
65
|
+
"""
|
66
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
67
|
+
"""
|
62
68
|
return pulumi.get(self, "cas_required")
|
63
69
|
|
64
70
|
@property
|
@@ -75,11 +81,17 @@ class SecretV2CustomMetadata(dict):
|
|
75
81
|
@property
|
76
82
|
@pulumi.getter(name="deleteVersionAfter")
|
77
83
|
def delete_version_after(self) -> Optional[int]:
|
84
|
+
"""
|
85
|
+
If set, specifies the length of time before a version is deleted.
|
86
|
+
"""
|
78
87
|
return pulumi.get(self, "delete_version_after")
|
79
88
|
|
80
89
|
@property
|
81
90
|
@pulumi.getter(name="maxVersions")
|
82
91
|
def max_versions(self) -> Optional[int]:
|
92
|
+
"""
|
93
|
+
The number of versions to keep per key.
|
94
|
+
"""
|
83
95
|
return pulumi.get(self, "max_versions")
|
84
96
|
|
85
97
|
|
@@ -453,7 +453,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
453
453
|
|
454
454
|
## Import
|
455
455
|
|
456
|
-
LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
|
456
|
+
LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
|
457
457
|
|
458
458
|
```sh
|
459
459
|
$ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
|
@@ -534,7 +534,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
534
534
|
|
535
535
|
## Import
|
536
536
|
|
537
|
-
LDAP secret backend dynamic role can be imported using the full path to the role of the form`<mount_path>/dynamic-role/<role_name>` e.g.
|
537
|
+
LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
|
538
538
|
|
539
539
|
```sh
|
540
540
|
$ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
|
@@ -276,7 +276,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
276
276
|
|
277
277
|
## Import
|
278
278
|
|
279
|
-
LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
|
279
|
+
LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
|
280
280
|
|
281
281
|
```sh
|
282
282
|
$ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
|
@@ -327,7 +327,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
327
327
|
|
328
328
|
## Import
|
329
329
|
|
330
|
-
LDAP secret backend static role can be imported using the full path to the role of the form`<mount_path>/static-role/<role_name>` e.g.
|
330
|
+
LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
|
331
331
|
|
332
332
|
```sh
|
333
333
|
$ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
|
pulumi_vault/managed/_inputs.py
CHANGED
@@ -53,6 +53,7 @@ class KeysAwArgs:
|
|
53
53
|
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
54
54
|
:param pulumi.Input[str] endpoint: Used to specify a custom AWS endpoint.
|
55
55
|
:param pulumi.Input[str] region: The AWS region where the keys are stored (or will be stored).
|
56
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
56
57
|
"""
|
57
58
|
pulumi.set(__self__, "access_key", access_key)
|
58
59
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -243,6 +244,9 @@ class KeysAwArgs:
|
|
243
244
|
@property
|
244
245
|
@pulumi.getter
|
245
246
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
247
|
+
"""
|
248
|
+
ID of the managed key read from Vault
|
249
|
+
"""
|
246
250
|
return pulumi.get(self, "uuid")
|
247
251
|
|
248
252
|
@uuid.setter
|
@@ -289,6 +293,7 @@ class KeysAzureArgs:
|
|
289
293
|
:param pulumi.Input[str] environment: The Azure Cloud environment API endpoints to use.
|
290
294
|
:param pulumi.Input[str] key_bits: The size in bits for an RSA key.
|
291
295
|
:param pulumi.Input[str] resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
296
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
292
297
|
"""
|
293
298
|
pulumi.set(__self__, "client_id", client_id)
|
294
299
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -491,6 +496,9 @@ class KeysAzureArgs:
|
|
491
496
|
@property
|
492
497
|
@pulumi.getter
|
493
498
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
499
|
+
"""
|
500
|
+
ID of the managed key read from Vault
|
501
|
+
"""
|
494
502
|
return pulumi.get(self, "uuid")
|
495
503
|
|
496
504
|
@uuid.setter
|
@@ -544,6 +552,7 @@ class KeysPkcArgs:
|
|
544
552
|
:param pulumi.Input[str] slot: The slot number to use, specified as a string in a decimal format
|
545
553
|
(e.g. `2305843009213693953`).
|
546
554
|
:param pulumi.Input[str] token_label: The slot token label to use.
|
555
|
+
:param pulumi.Input[str] uuid: ID of the managed key read from Vault
|
547
556
|
"""
|
548
557
|
pulumi.set(__self__, "key_id", key_id)
|
549
558
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -766,6 +775,9 @@ class KeysPkcArgs:
|
|
766
775
|
@property
|
767
776
|
@pulumi.getter
|
768
777
|
def uuid(self) -> Optional[pulumi.Input[str]]:
|
778
|
+
"""
|
779
|
+
ID of the managed key read from Vault
|
780
|
+
"""
|
769
781
|
return pulumi.get(self, "uuid")
|
770
782
|
|
771
783
|
@uuid.setter
|
pulumi_vault/managed/keys.py
CHANGED
@@ -180,6 +180,16 @@ class Keys(pulumi.CustomResource):
|
|
180
180
|
pkcs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['KeysPkcArgs']]]]] = None,
|
181
181
|
__props__=None):
|
182
182
|
"""
|
183
|
+
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
184
|
+
|
185
|
+
**Note** this feature is available only with Vault Enterprise.
|
186
|
+
|
187
|
+
## Caveats
|
188
|
+
|
189
|
+
This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
|
190
|
+
There can only be one such resource in the TF state, and if there are already provisioned managed
|
191
|
+
keys in Vault, we recommend using `pulumi import` instead.
|
192
|
+
|
183
193
|
## Import
|
184
194
|
|
185
195
|
Mounts can be imported using the `id` of `default`, e.g.
|
@@ -205,6 +215,16 @@ class Keys(pulumi.CustomResource):
|
|
205
215
|
args: Optional[KeysArgs] = None,
|
206
216
|
opts: Optional[pulumi.ResourceOptions] = None):
|
207
217
|
"""
|
218
|
+
A resource that manages the lifecycle of all [Managed Keys](https://www.vaultproject.io/docs/enterprise/managed-keys) in Vault.
|
219
|
+
|
220
|
+
**Note** this feature is available only with Vault Enterprise.
|
221
|
+
|
222
|
+
## Caveats
|
223
|
+
|
224
|
+
This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
|
225
|
+
There can only be one such resource in the TF state, and if there are already provisioned managed
|
226
|
+
keys in Vault, we recommend using `pulumi import` instead.
|
227
|
+
|
208
228
|
## Import
|
209
229
|
|
210
230
|
Mounts can be imported using the `id` of `default`, e.g.
|
pulumi_vault/managed/outputs.py
CHANGED
@@ -86,6 +86,7 @@ class KeysAw(dict):
|
|
86
86
|
is `ECDSA`. Required if `allow_generate_key` is `true`.
|
87
87
|
:param str endpoint: Used to specify a custom AWS endpoint.
|
88
88
|
:param str region: The AWS region where the keys are stored (or will be stored).
|
89
|
+
:param str uuid: ID of the managed key read from Vault
|
89
90
|
"""
|
90
91
|
pulumi.set(__self__, "access_key", access_key)
|
91
92
|
pulumi.set(__self__, "key_bits", key_bits)
|
@@ -224,6 +225,9 @@ class KeysAw(dict):
|
|
224
225
|
@property
|
225
226
|
@pulumi.getter
|
226
227
|
def uuid(self) -> Optional[str]:
|
228
|
+
"""
|
229
|
+
ID of the managed key read from Vault
|
230
|
+
"""
|
227
231
|
return pulumi.get(self, "uuid")
|
228
232
|
|
229
233
|
|
@@ -303,6 +307,7 @@ class KeysAzure(dict):
|
|
303
307
|
:param str environment: The Azure Cloud environment API endpoints to use.
|
304
308
|
:param str key_bits: The size in bits for an RSA key.
|
305
309
|
:param str resource: The Azure Key Vault resource's DNS Suffix to connect to.
|
310
|
+
:param str uuid: ID of the managed key read from Vault
|
306
311
|
"""
|
307
312
|
pulumi.set(__self__, "client_id", client_id)
|
308
313
|
pulumi.set(__self__, "client_secret", client_secret)
|
@@ -449,6 +454,9 @@ class KeysAzure(dict):
|
|
449
454
|
@property
|
450
455
|
@pulumi.getter
|
451
456
|
def uuid(self) -> Optional[str]:
|
457
|
+
"""
|
458
|
+
ID of the managed key read from Vault
|
459
|
+
"""
|
452
460
|
return pulumi.get(self, "uuid")
|
453
461
|
|
454
462
|
|
@@ -531,6 +539,7 @@ class KeysPkc(dict):
|
|
531
539
|
:param str slot: The slot number to use, specified as a string in a decimal format
|
532
540
|
(e.g. `2305843009213693953`).
|
533
541
|
:param str token_label: The slot token label to use.
|
542
|
+
:param str uuid: ID of the managed key read from Vault
|
534
543
|
"""
|
535
544
|
pulumi.set(__self__, "key_id", key_id)
|
536
545
|
pulumi.set(__self__, "key_label", key_label)
|
@@ -693,6 +702,9 @@ class KeysPkc(dict):
|
|
693
702
|
@property
|
694
703
|
@pulumi.getter
|
695
704
|
def uuid(self) -> Optional[str]:
|
705
|
+
"""
|
706
|
+
ID of the managed key read from Vault
|
707
|
+
"""
|
696
708
|
return pulumi.get(self, "uuid")
|
697
709
|
|
698
710
|
|
@@ -443,7 +443,7 @@ class SecretRole(pulumi.CustomResource):
|
|
443
443
|
|
444
444
|
## Import
|
445
445
|
|
446
|
-
The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
|
446
|
+
The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
|
447
447
|
|
448
448
|
```sh
|
449
449
|
$ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
|
@@ -503,7 +503,7 @@ class SecretRole(pulumi.CustomResource):
|
|
503
503
|
|
504
504
|
## Import
|
505
505
|
|
506
|
-
The MongoDB Atlas secret role can be imported using the full path to the role of the form`<mount_path>/roles/<role_name>` e.g.
|
506
|
+
The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
|
507
507
|
|
508
508
|
```sh
|
509
509
|
$ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
|
pulumi_vault/namespace.py
CHANGED
@@ -206,10 +206,14 @@ class Namespace(pulumi.CustomResource):
|
|
206
206
|
Namespaces can be imported using its `name` as accessor id
|
207
207
|
|
208
208
|
```sh
|
209
|
-
|
209
|
+
$ pulumi import vault:index/namespace:Namespace example <name>
|
210
210
|
```
|
211
211
|
|
212
|
-
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
212
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
213
|
+
|
214
|
+
hcl
|
215
|
+
|
216
|
+
provider "vault" {
|
213
217
|
|
214
218
|
# Configuration options
|
215
219
|
|
@@ -217,19 +221,29 @@ class Namespace(pulumi.CustomResource):
|
|
217
221
|
|
218
222
|
alias
|
219
223
|
|
220
|
-
= "example"
|
224
|
+
= "example"
|
225
|
+
|
226
|
+
}
|
227
|
+
|
228
|
+
resource "vault_namespace" "example2" {
|
221
229
|
|
222
230
|
provider = vault.example
|
223
231
|
|
224
232
|
path
|
225
233
|
|
226
|
-
= "example2"
|
234
|
+
= "example2"
|
235
|
+
|
236
|
+
}
|
227
237
|
|
228
238
|
```sh
|
229
|
-
|
239
|
+
$ pulumi import vault:index/namespace:Namespace example2 example2
|
230
240
|
```
|
231
241
|
|
232
|
-
$ terraform state show vault_namespace.example2
|
242
|
+
$ terraform state show vault_namespace.example2
|
243
|
+
|
244
|
+
vault_namespace.example2:
|
245
|
+
|
246
|
+
resource "vault_namespace" "example2" {
|
233
247
|
|
234
248
|
id
|
235
249
|
|
@@ -243,7 +257,9 @@ class Namespace(pulumi.CustomResource):
|
|
243
257
|
|
244
258
|
path_fq
|
245
259
|
|
246
|
-
= "example2"
|
260
|
+
= "example2"
|
261
|
+
|
262
|
+
}
|
247
263
|
|
248
264
|
:param str resource_name: The name of the resource.
|
249
265
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -269,10 +285,14 @@ class Namespace(pulumi.CustomResource):
|
|
269
285
|
Namespaces can be imported using its `name` as accessor id
|
270
286
|
|
271
287
|
```sh
|
272
|
-
|
288
|
+
$ pulumi import vault:index/namespace:Namespace example <name>
|
273
289
|
```
|
274
290
|
|
275
|
-
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
291
|
+
If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
|
292
|
+
|
293
|
+
hcl
|
294
|
+
|
295
|
+
provider "vault" {
|
276
296
|
|
277
297
|
# Configuration options
|
278
298
|
|
@@ -280,19 +300,29 @@ class Namespace(pulumi.CustomResource):
|
|
280
300
|
|
281
301
|
alias
|
282
302
|
|
283
|
-
= "example"
|
303
|
+
= "example"
|
304
|
+
|
305
|
+
}
|
306
|
+
|
307
|
+
resource "vault_namespace" "example2" {
|
284
308
|
|
285
309
|
provider = vault.example
|
286
310
|
|
287
311
|
path
|
288
312
|
|
289
|
-
= "example2"
|
313
|
+
= "example2"
|
314
|
+
|
315
|
+
}
|
290
316
|
|
291
317
|
```sh
|
292
|
-
|
318
|
+
$ pulumi import vault:index/namespace:Namespace example2 example2
|
293
319
|
```
|
294
320
|
|
295
|
-
$ terraform state show vault_namespace.example2
|
321
|
+
$ terraform state show vault_namespace.example2
|
322
|
+
|
323
|
+
vault_namespace.example2:
|
324
|
+
|
325
|
+
resource "vault_namespace" "example2" {
|
296
326
|
|
297
327
|
id
|
298
328
|
|
@@ -306,7 +336,9 @@ class Namespace(pulumi.CustomResource):
|
|
306
336
|
|
307
337
|
path_fq
|
308
338
|
|
309
|
-
= "example2"
|
339
|
+
= "example2"
|
340
|
+
|
341
|
+
}
|
310
342
|
|
311
343
|
:param str resource_name: The name of the resource.
|
312
344
|
:param NamespaceArgs args: The arguments to use to populate this resource's properties.
|
@@ -185,9 +185,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
185
185
|
namespace: Optional[pulumi.Input[str]] = None,
|
186
186
|
__props__=None):
|
187
187
|
"""
|
188
|
-
Allows setting the value of the default issuer. For more information, see the
|
189
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
|
190
|
-
|
191
188
|
## Example Usage
|
192
189
|
|
193
190
|
```python
|
@@ -241,9 +238,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
241
238
|
args: SecretBackendConfigIssuersArgs,
|
242
239
|
opts: Optional[pulumi.ResourceOptions] = None):
|
243
240
|
"""
|
244
|
-
Allows setting the value of the default issuer. For more information, see the
|
245
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#set-issuers-configuration)
|
246
|
-
|
247
241
|
## Example Usage
|
248
242
|
|
249
243
|
```python
|
@@ -484,11 +484,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
484
484
|
usage: Optional[pulumi.Input[str]] = None,
|
485
485
|
__props__=None):
|
486
486
|
"""
|
487
|
-
Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
|
488
|
-
create issuers. It instead tracks and performs updates made to an existing issuer that was
|
489
|
-
created by one of the PKI generate endpoints. For more information, see the
|
490
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
|
491
|
-
|
492
487
|
## Example Usage
|
493
488
|
|
494
489
|
```python
|
@@ -551,11 +546,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
551
546
|
args: SecretBackendIssuerArgs,
|
552
547
|
opts: Optional[pulumi.ResourceOptions] = None):
|
553
548
|
"""
|
554
|
-
Manages the lifecycle of an existing issuer on a PKI Secret Backend. This resource does not
|
555
|
-
create issuers. It instead tracks and performs updates made to an existing issuer that was
|
556
|
-
created by one of the PKI generate endpoints. For more information, see the
|
557
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/secret/pki#managing-keys-and-issuers)
|
558
|
-
|
559
549
|
## Example Usage
|
560
550
|
|
561
551
|
```python
|
@@ -106,7 +106,7 @@ class SecretBackendRoleArgs:
|
|
106
106
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
107
|
*Available only for Vault Enterprise*.
|
108
108
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
109
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
109
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
110
110
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
111
111
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
112
112
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -621,7 +621,7 @@ class SecretBackendRoleArgs:
|
|
621
621
|
@pulumi.getter(name="notBeforeDuration")
|
622
622
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
623
623
|
"""
|
624
|
-
Specifies the
|
624
|
+
Specifies the duration by which to backdate the NotBefore property.
|
625
625
|
"""
|
626
626
|
return pulumi.get(self, "not_before_duration")
|
627
627
|
|
@@ -867,7 +867,7 @@ class _SecretBackendRoleState:
|
|
867
867
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
868
868
|
*Available only for Vault Enterprise*.
|
869
869
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
870
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
870
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
871
871
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
872
872
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
873
873
|
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -1383,7 +1383,7 @@ class _SecretBackendRoleState:
|
|
1383
1383
|
@pulumi.getter(name="notBeforeDuration")
|
1384
1384
|
def not_before_duration(self) -> Optional[pulumi.Input[str]]:
|
1385
1385
|
"""
|
1386
|
-
Specifies the
|
1386
|
+
Specifies the duration by which to backdate the NotBefore property.
|
1387
1387
|
"""
|
1388
1388
|
return pulumi.get(self, "not_before_duration")
|
1389
1389
|
|
@@ -1667,7 +1667,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1667
1667
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1668
1668
|
*Available only for Vault Enterprise*.
|
1669
1669
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1670
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
1670
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1671
1671
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1672
1672
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1673
1673
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -1945,7 +1945,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1945
1945
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1946
1946
|
*Available only for Vault Enterprise*.
|
1947
1947
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1948
|
-
:param pulumi.Input[str] not_before_duration: Specifies the
|
1948
|
+
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1949
1949
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1950
1950
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1951
1951
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
@@ -2288,7 +2288,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2288
2288
|
@pulumi.getter(name="notBeforeDuration")
|
2289
2289
|
def not_before_duration(self) -> pulumi.Output[str]:
|
2290
2290
|
"""
|
2291
|
-
Specifies the
|
2291
|
+
Specifies the duration by which to backdate the NotBefore property.
|
2292
2292
|
"""
|
2293
2293
|
return pulumi.get(self, "not_before_duration")
|
2294
2294
|
|