pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +61 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +218 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +68 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +112 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -128,7 +133,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
128
133
|
key_name="example",
|
129
134
|
key_type="rsa",
|
130
135
|
key_bits=4096)
|
131
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
136
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
132
137
|
key_ref=key_id))
|
133
138
|
```
|
134
139
|
|
@@ -138,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
138
143
|
:param str key_ref: Reference to an existing key.
|
139
144
|
:param str namespace: The namespace of the target resource.
|
140
145
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
147
|
*Available only for Vault Enterprise*.
|
143
148
|
"""
|
144
149
|
__args__ = dict()
|
@@ -156,13 +161,10 @@ def get_backend_key(backend: Optional[str] = None,
|
|
156
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
157
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
158
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
159
|
-
|
160
|
-
|
161
|
-
@_utilities.lift_output_func(get_backend_key)
|
162
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
163
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
164
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
165
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
|
167
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
166
168
|
"""
|
167
169
|
## Example Usage
|
168
170
|
|
@@ -180,7 +182,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
180
182
|
key_name="example",
|
181
183
|
key_type="rsa",
|
182
184
|
key_bits=4096)
|
183
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
185
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
184
186
|
key_ref=key_id))
|
185
187
|
```
|
186
188
|
|
@@ -190,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
190
192
|
:param str key_ref: Reference to an existing key.
|
191
193
|
:param str namespace: The namespace of the target resource.
|
192
194
|
The value should not contain leading or trailing forward slashes.
|
193
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
194
196
|
*Available only for Vault Enterprise*.
|
195
197
|
"""
|
196
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['keyRef'] = key_ref
|
201
|
+
__args__['namespace'] = namespace
|
202
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of key strings read from Vault.
|
62
67
|
"""
|
@@ -126,7 +131,7 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
126
131
|
read the keys from, with no leading or trailing `/`s.
|
127
132
|
:param str namespace: The namespace of the target resource.
|
128
133
|
The value should not contain leading or trailing forward slashes.
|
129
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
130
135
|
*Available only for Vault Enterprise*.
|
131
136
|
"""
|
132
137
|
__args__ = dict()
|
@@ -142,12 +147,9 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
142
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
143
148
|
keys=pulumi.get(__ret__, 'keys'),
|
144
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
145
|
-
|
146
|
-
|
147
|
-
@_utilities.lift_output_func(get_backend_keys)
|
148
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
149
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
150
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
151
153
|
"""
|
152
154
|
## Example Usage
|
153
155
|
|
@@ -173,7 +175,18 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
173
175
|
read the keys from, with no leading or trailing `/`s.
|
174
176
|
:param str namespace: The namespace of the target resource.
|
175
177
|
The value should not contain leading or trailing forward slashes.
|
176
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
179
|
*Available only for Vault Enterprise*.
|
178
180
|
"""
|
179
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,15 +4,74 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigCmpv2Authenticators',
|
19
|
+
'BackendConfigEstAuthenticators',
|
13
20
|
'SecretBackendRolePolicyIdentifier',
|
21
|
+
'GetBackendConfigCmpv2AuthenticatorResult',
|
22
|
+
'GetBackendConfigEstAuthenticatorResult',
|
14
23
|
]
|
15
24
|
|
25
|
+
@pulumi.output_type
|
26
|
+
class BackendConfigCmpv2Authenticators(dict):
|
27
|
+
def __init__(__self__, *,
|
28
|
+
cert: Optional[Mapping[str, str]] = None):
|
29
|
+
"""
|
30
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
"""
|
32
|
+
if cert is not None:
|
33
|
+
pulumi.set(__self__, "cert", cert)
|
34
|
+
|
35
|
+
@property
|
36
|
+
@pulumi.getter
|
37
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
38
|
+
"""
|
39
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
40
|
+
"""
|
41
|
+
return pulumi.get(self, "cert")
|
42
|
+
|
43
|
+
|
44
|
+
@pulumi.output_type
|
45
|
+
class BackendConfigEstAuthenticators(dict):
|
46
|
+
def __init__(__self__, *,
|
47
|
+
cert: Optional[Mapping[str, str]] = None,
|
48
|
+
userpass: Optional[Mapping[str, str]] = None):
|
49
|
+
"""
|
50
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
51
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
52
|
+
"""
|
53
|
+
if cert is not None:
|
54
|
+
pulumi.set(__self__, "cert", cert)
|
55
|
+
if userpass is not None:
|
56
|
+
pulumi.set(__self__, "userpass", userpass)
|
57
|
+
|
58
|
+
@property
|
59
|
+
@pulumi.getter
|
60
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
61
|
+
"""
|
62
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
63
|
+
"""
|
64
|
+
return pulumi.get(self, "cert")
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter
|
68
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
69
|
+
"""
|
70
|
+
"The accessor (required) property for user pass auth backends".
|
71
|
+
"""
|
72
|
+
return pulumi.get(self, "userpass")
|
73
|
+
|
74
|
+
|
16
75
|
@pulumi.output_type
|
17
76
|
class SecretBackendRolePolicyIdentifier(dict):
|
18
77
|
def __init__(__self__, *,
|
@@ -59,3 +118,53 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
59
118
|
return pulumi.get(self, "notice")
|
60
119
|
|
61
120
|
|
121
|
+
@pulumi.output_type
|
122
|
+
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
123
|
+
def __init__(__self__, *,
|
124
|
+
cert: Optional[Mapping[str, str]] = None):
|
125
|
+
"""
|
126
|
+
:param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
|
127
|
+
"""
|
128
|
+
if cert is not None:
|
129
|
+
pulumi.set(__self__, "cert", cert)
|
130
|
+
|
131
|
+
@property
|
132
|
+
@pulumi.getter
|
133
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
134
|
+
"""
|
135
|
+
The accessor and cert_role properties for cert auth backends
|
136
|
+
"""
|
137
|
+
return pulumi.get(self, "cert")
|
138
|
+
|
139
|
+
|
140
|
+
@pulumi.output_type
|
141
|
+
class GetBackendConfigEstAuthenticatorResult(dict):
|
142
|
+
def __init__(__self__, *,
|
143
|
+
cert: Optional[Mapping[str, str]] = None,
|
144
|
+
userpass: Optional[Mapping[str, str]] = None):
|
145
|
+
"""
|
146
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
147
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
148
|
+
"""
|
149
|
+
if cert is not None:
|
150
|
+
pulumi.set(__self__, "cert", cert)
|
151
|
+
if userpass is not None:
|
152
|
+
pulumi.set(__self__, "userpass", userpass)
|
153
|
+
|
154
|
+
@property
|
155
|
+
@pulumi.getter
|
156
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
157
|
+
"""
|
158
|
+
"The accessor and cert_role properties for cert auth backends".
|
159
|
+
"""
|
160
|
+
return pulumi.get(self, "cert")
|
161
|
+
|
162
|
+
@property
|
163
|
+
@pulumi.getter
|
164
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
165
|
+
"""
|
166
|
+
"The accessor property for user pass auth backends".
|
167
|
+
"""
|
168
|
+
return pulumi.get(self, "userpass")
|
169
|
+
|
170
|
+
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
|
|
45
50
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
46
51
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
47
52
|
The value should not contain leading or trailing forward slashes.
|
48
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
53
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
54
|
*Available only for Vault Enterprise*.
|
50
55
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
51
56
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
|
|
213
218
|
"""
|
214
219
|
The namespace to provision the resource in.
|
215
220
|
The value should not contain leading or trailing forward slashes.
|
216
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
221
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
217
222
|
*Available only for Vault Enterprise*.
|
218
223
|
"""
|
219
224
|
return pulumi.get(self, "namespace")
|
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
|
|
341
346
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
342
347
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
348
|
The value should not contain leading or trailing forward slashes.
|
344
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
349
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
350
|
*Available only for Vault Enterprise*.
|
346
351
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
347
352
|
:param pulumi.Input[str] private_key: The private key
|
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
|
|
579
584
|
"""
|
580
585
|
The namespace to provision the resource in.
|
581
586
|
The value should not contain leading or trailing forward slashes.
|
582
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
583
588
|
*Available only for Vault Enterprise*.
|
584
589
|
"""
|
585
590
|
return pulumi.get(self, "namespace")
|
@@ -740,9 +745,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
740
745
|
import pulumi_vault as vault
|
741
746
|
|
742
747
|
app = vault.pki_secret.SecretBackendCert("app",
|
743
|
-
backend=
|
748
|
+
backend=intermediate["path"],
|
749
|
+
name=test["name"],
|
744
750
|
common_name="app.my.domain",
|
745
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
751
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
746
752
|
```
|
747
753
|
|
748
754
|
:param str resource_name: The name of the resource.
|
@@ -759,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
759
765
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
760
766
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
761
767
|
The value should not contain leading or trailing forward slashes.
|
762
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
768
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
763
769
|
*Available only for Vault Enterprise*.
|
764
770
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
765
771
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -782,9 +788,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
782
788
|
import pulumi_vault as vault
|
783
789
|
|
784
790
|
app = vault.pki_secret.SecretBackendCert("app",
|
785
|
-
backend=
|
791
|
+
backend=intermediate["path"],
|
792
|
+
name=test["name"],
|
786
793
|
common_name="app.my.domain",
|
787
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
794
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
788
795
|
```
|
789
796
|
|
790
797
|
:param str resource_name: The name of the resource.
|
@@ -917,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
917
924
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
918
925
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
919
926
|
The value should not contain leading or trailing forward slashes.
|
920
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
927
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
921
928
|
*Available only for Vault Enterprise*.
|
922
929
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
923
930
|
:param pulumi.Input[str] private_key: The private key
|
@@ -1079,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
1079
1086
|
"""
|
1080
1087
|
The namespace to provision the resource in.
|
1081
1088
|
The value should not contain leading or trailing forward slashes.
|
1082
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1089
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1083
1090
|
*Available only for Vault Enterprise*.
|
1084
1091
|
"""
|
1085
1092
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
|
|
23
28
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
|
|
82
87
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -150,7 +155,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
150
155
|
import pulumi_vault as vault
|
151
156
|
|
152
157
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
153
|
-
backend=
|
158
|
+
backend=intermediate_vault_mount["path"],
|
154
159
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
155
160
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
156
161
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -200,7 +205,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
200
205
|
MUR4qFxeUOW/GJGccMUd
|
201
206
|
-----END CERTIFICATE-----
|
202
207
|
\"\"\",
|
203
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
208
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
204
209
|
```
|
205
210
|
|
206
211
|
:param str resource_name: The name of the resource.
|
@@ -208,7 +213,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
208
213
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
209
214
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
210
215
|
The value should not contain leading or trailing forward slashes.
|
211
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
212
217
|
*Available only for Vault Enterprise*.
|
213
218
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
214
219
|
"""
|
@@ -226,7 +231,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
226
231
|
import pulumi_vault as vault
|
227
232
|
|
228
233
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
229
|
-
backend=
|
234
|
+
backend=intermediate_vault_mount["path"],
|
230
235
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
231
236
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
232
237
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -276,7 +281,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
276
281
|
MUR4qFxeUOW/GJGccMUd
|
277
282
|
-----END CERTIFICATE-----
|
278
283
|
\"\"\",
|
279
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
284
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
280
285
|
```
|
281
286
|
|
282
287
|
:param str resource_name: The name of the resource.
|
@@ -338,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
338
343
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
339
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
340
345
|
The value should not contain leading or trailing forward slashes.
|
341
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
346
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
342
347
|
*Available only for Vault Enterprise*.
|
343
348
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
344
349
|
"""
|
@@ -365,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
365
370
|
"""
|
366
371
|
The namespace to provision the resource in.
|
367
372
|
The value should not contain leading or trailing forward slashes.
|
368
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
369
374
|
*Available only for Vault Enterprise*.
|
370
375
|
"""
|
371
376
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
|
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
|
|
27
32
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
28
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
34
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
36
|
*Available only for Vault Enterprise*.
|
32
37
|
"""
|
33
38
|
pulumi.set(__self__, "backend", backend)
|
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
|
|
82
87
|
"""
|
83
88
|
The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
"""
|
88
93
|
return pulumi.get(self, "namespace")
|
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
|
|
108
113
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
109
114
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
110
115
|
The value should not contain leading or trailing forward slashes.
|
111
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
116
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
112
117
|
*Available only for Vault Enterprise*.
|
113
118
|
"""
|
114
119
|
if backend is not None:
|
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
|
|
164
169
|
"""
|
165
170
|
The namespace to provision the resource in.
|
166
171
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
172
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
173
|
*Available only for Vault Enterprise*.
|
169
174
|
"""
|
170
175
|
return pulumi.get(self, "namespace")
|
@@ -216,7 +221,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
216
221
|
PKI secret backend config issuers can be imported using the path, e.g.
|
217
222
|
|
218
223
|
```sh
|
219
|
-
|
224
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
|
220
225
|
```
|
221
226
|
|
222
227
|
:param str resource_name: The name of the resource.
|
@@ -228,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
228
233
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
229
234
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
230
235
|
The value should not contain leading or trailing forward slashes.
|
231
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
236
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
232
237
|
*Available only for Vault Enterprise*.
|
233
238
|
"""
|
234
239
|
...
|
@@ -269,7 +274,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
269
274
|
PKI secret backend config issuers can be imported using the path, e.g.
|
270
275
|
|
271
276
|
```sh
|
272
|
-
|
277
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
|
273
278
|
```
|
274
279
|
|
275
280
|
:param str resource_name: The name of the resource.
|
@@ -334,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
334
339
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
335
340
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
336
341
|
The value should not contain leading or trailing forward slashes.
|
337
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
342
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
338
343
|
*Available only for Vault Enterprise*.
|
339
344
|
"""
|
340
345
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -379,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
379
384
|
"""
|
380
385
|
The namespace to provision the resource in.
|
381
386
|
The value should not contain leading or trailing forward slashes.
|
382
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
387
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
383
388
|
*Available only for Vault Enterprise*.
|
384
389
|
"""
|
385
390
|
return pulumi.get(self, "namespace")
|