pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
16
21
  def __init__(__self__, *,
17
22
  backend: pulumi.Input[str],
18
23
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
+ enable_templating: Optional[pulumi.Input[bool]] = None,
19
25
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
26
  namespace: Optional[pulumi.Input[str]] = None,
21
27
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
23
29
  The set of arguments for constructing a SecretBackendConfigUrls resource.
24
30
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
25
31
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
32
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
26
33
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
27
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
35
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
37
  *Available only for Vault Enterprise*.
31
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
32
39
  """
33
40
  pulumi.set(__self__, "backend", backend)
34
41
  if crl_distribution_points is not None:
35
42
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
43
+ if enable_templating is not None:
44
+ pulumi.set(__self__, "enable_templating", enable_templating)
36
45
  if issuing_certificates is not None:
37
46
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
38
47
  if namespace is not None:
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
64
73
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
65
74
  pulumi.set(self, "crl_distribution_points", value)
66
75
 
76
+ @property
77
+ @pulumi.getter(name="enableTemplating")
78
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
79
+ """
80
+ Specifies that templating of AIA fields is allowed.
81
+ """
82
+ return pulumi.get(self, "enable_templating")
83
+
84
+ @enable_templating.setter
85
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
86
+ pulumi.set(self, "enable_templating", value)
87
+
67
88
  @property
68
89
  @pulumi.getter(name="issuingCertificates")
69
90
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
82
103
  """
83
104
  The namespace to provision the resource in.
84
105
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
106
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
107
  *Available only for Vault Enterprise*.
87
108
  """
88
109
  return pulumi.get(self, "namespace")
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
109
130
  def __init__(__self__, *,
110
131
  backend: Optional[pulumi.Input[str]] = None,
111
132
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
133
+ enable_templating: Optional[pulumi.Input[bool]] = None,
112
134
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
113
135
  namespace: Optional[pulumi.Input[str]] = None,
114
136
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
116
138
  Input properties used for looking up and filtering SecretBackendConfigUrls resources.
117
139
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
118
140
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
141
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
119
142
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
120
143
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
144
  The value should not contain leading or trailing forward slashes.
122
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
146
  *Available only for Vault Enterprise*.
124
147
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
125
148
  """
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
127
150
  pulumi.set(__self__, "backend", backend)
128
151
  if crl_distribution_points is not None:
129
152
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
153
+ if enable_templating is not None:
154
+ pulumi.set(__self__, "enable_templating", enable_templating)
130
155
  if issuing_certificates is not None:
131
156
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
132
157
  if namespace is not None:
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
158
183
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
159
184
  pulumi.set(self, "crl_distribution_points", value)
160
185
 
186
+ @property
187
+ @pulumi.getter(name="enableTemplating")
188
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
189
+ """
190
+ Specifies that templating of AIA fields is allowed.
191
+ """
192
+ return pulumi.get(self, "enable_templating")
193
+
194
+ @enable_templating.setter
195
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
196
+ pulumi.set(self, "enable_templating", value)
197
+
161
198
  @property
162
199
  @pulumi.getter(name="issuingCertificates")
163
200
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
176
213
  """
177
214
  The namespace to provision the resource in.
178
215
  The value should not contain leading or trailing forward slashes.
179
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
217
  *Available only for Vault Enterprise*.
181
218
  """
182
219
  return pulumi.get(self, "namespace")
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
205
242
  opts: Optional[pulumi.ResourceOptions] = None,
206
243
  backend: Optional[pulumi.Input[str]] = None,
207
244
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
245
+ enable_templating: Optional[pulumi.Input[bool]] = None,
208
246
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
209
247
  namespace: Optional[pulumi.Input[str]] = None,
210
248
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -231,20 +269,23 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
231
269
 
232
270
  ## Import
233
271
 
234
- The PKI config URLs can be imported using the resource's `id`. In the case of the example above the `id` would be `pki-root/config/urls`, where the `pki-root` component is the resource's `backend`, e.g.
272
+ The PKI config URLs can be imported using the resource's `id`.
273
+ In the case of the example above the `id` would be `pki-root/config/urls`,
274
+ where the `pki-root` component is the resource's `backend`, e.g.
235
275
 
236
276
  ```sh
237
- $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
277
+ $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
238
278
  ```
239
279
 
240
280
  :param str resource_name: The name of the resource.
241
281
  :param pulumi.ResourceOptions opts: Options for the resource.
242
282
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
243
283
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
284
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
244
285
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
245
286
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
246
287
  The value should not contain leading or trailing forward slashes.
247
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
288
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
248
289
  *Available only for Vault Enterprise*.
249
290
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
250
291
  """
@@ -276,10 +317,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
276
317
 
277
318
  ## Import
278
319
 
279
- The PKI config URLs can be imported using the resource's `id`. In the case of the example above the `id` would be `pki-root/config/urls`, where the `pki-root` component is the resource's `backend`, e.g.
320
+ The PKI config URLs can be imported using the resource's `id`.
321
+ In the case of the example above the `id` would be `pki-root/config/urls`,
322
+ where the `pki-root` component is the resource's `backend`, e.g.
280
323
 
281
324
  ```sh
282
- $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
325
+ $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
283
326
  ```
284
327
 
285
328
  :param str resource_name: The name of the resource.
@@ -299,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
299
342
  opts: Optional[pulumi.ResourceOptions] = None,
300
343
  backend: Optional[pulumi.Input[str]] = None,
301
344
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
345
+ enable_templating: Optional[pulumi.Input[bool]] = None,
302
346
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
303
347
  namespace: Optional[pulumi.Input[str]] = None,
304
348
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -315,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
315
359
  raise TypeError("Missing required property 'backend'")
316
360
  __props__.__dict__["backend"] = backend
317
361
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
362
+ __props__.__dict__["enable_templating"] = enable_templating
318
363
  __props__.__dict__["issuing_certificates"] = issuing_certificates
319
364
  __props__.__dict__["namespace"] = namespace
320
365
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -330,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
330
375
  opts: Optional[pulumi.ResourceOptions] = None,
331
376
  backend: Optional[pulumi.Input[str]] = None,
332
377
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
378
+ enable_templating: Optional[pulumi.Input[bool]] = None,
333
379
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
334
380
  namespace: Optional[pulumi.Input[str]] = None,
335
381
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
@@ -342,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
342
388
  :param pulumi.ResourceOptions opts: Options for the resource.
343
389
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
344
390
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
391
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
345
392
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
346
393
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
347
394
  The value should not contain leading or trailing forward slashes.
348
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
395
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
349
396
  *Available only for Vault Enterprise*.
350
397
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
351
398
  """
@@ -355,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
355
402
 
356
403
  __props__.__dict__["backend"] = backend
357
404
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
405
+ __props__.__dict__["enable_templating"] = enable_templating
358
406
  __props__.__dict__["issuing_certificates"] = issuing_certificates
359
407
  __props__.__dict__["namespace"] = namespace
360
408
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -376,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
376
424
  """
377
425
  return pulumi.get(self, "crl_distribution_points")
378
426
 
427
+ @property
428
+ @pulumi.getter(name="enableTemplating")
429
+ def enable_templating(self) -> pulumi.Output[Optional[bool]]:
430
+ """
431
+ Specifies that templating of AIA fields is allowed.
432
+ """
433
+ return pulumi.get(self, "enable_templating")
434
+
379
435
  @property
380
436
  @pulumi.getter(name="issuingCertificates")
381
437
  def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -390,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
390
446
  """
391
447
  The namespace to provision the resource in.
392
448
  The value should not contain leading or trailing forward slashes.
393
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
449
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
394
450
  *Available only for Vault Enterprise*.
395
451
  """
396
452
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
@@ -40,7 +45,7 @@ class SecretBackendCrlConfigArgs:
40
45
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
41
46
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
42
47
  The value should not contain leading or trailing forward slashes.
43
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
48
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
49
  *Available only for Vault Enterprise*.
45
50
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
46
51
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -178,7 +183,7 @@ class SecretBackendCrlConfigArgs:
178
183
  """
179
184
  The namespace to provision the resource in.
180
185
  The value should not contain leading or trailing forward slashes.
181
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
186
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
182
187
  *Available only for Vault Enterprise*.
183
188
  """
184
189
  return pulumi.get(self, "namespace")
@@ -267,7 +272,7 @@ class _SecretBackendCrlConfigState:
267
272
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
268
273
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
269
274
  The value should not contain leading or trailing forward slashes.
270
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
275
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
276
  *Available only for Vault Enterprise*.
272
277
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
273
278
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -406,7 +411,7 @@ class _SecretBackendCrlConfigState:
406
411
  """
407
412
  The namespace to provision the resource in.
408
413
  The value should not contain leading or trailing forward slashes.
409
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
414
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
410
415
  *Available only for Vault Enterprise*.
411
416
  """
412
417
  return pulumi.get(self, "namespace")
@@ -499,7 +504,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
499
504
  type="pki",
500
505
  default_lease_ttl_seconds=3600,
501
506
  max_lease_ttl_seconds=86400)
502
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
507
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
503
508
  backend=pki.path,
504
509
  expiry="72h",
505
510
  disable=False)
@@ -518,7 +523,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
518
523
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
519
524
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
520
525
  The value should not contain leading or trailing forward slashes.
521
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
526
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
522
527
  *Available only for Vault Enterprise*.
523
528
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
524
529
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -547,7 +552,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
547
552
  type="pki",
548
553
  default_lease_ttl_seconds=3600,
549
554
  max_lease_ttl_seconds=86400)
550
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
555
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
551
556
  backend=pki.path,
552
557
  expiry="72h",
553
558
  disable=False)
@@ -646,7 +651,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
646
651
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
647
652
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
648
653
  The value should not contain leading or trailing forward slashes.
649
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
654
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
650
655
  *Available only for Vault Enterprise*.
651
656
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
652
657
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -745,7 +750,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
745
750
  """
746
751
  The namespace to provision the resource in.
747
752
  The value should not contain leading or trailing forward slashes.
748
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
753
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
749
754
  *Available only for Vault Enterprise*.
750
755
  """
751
756
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
@@ -66,7 +71,7 @@ class SecretBackendIntermediateCertRequestArgs:
66
71
  required if `type` is `kms` and it conflicts with `managed_key_id`
67
72
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
68
73
  The value should not contain leading or trailing forward slashes.
69
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
74
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
70
75
  *Available only for Vault Enterprise*.
71
76
  :param pulumi.Input[str] organization: The organization
72
77
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -330,7 +335,7 @@ class SecretBackendIntermediateCertRequestArgs:
330
335
  """
331
336
  The namespace to provision the resource in.
332
337
  The value should not contain leading or trailing forward slashes.
333
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
338
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
334
339
  *Available only for Vault Enterprise*.
335
340
  """
336
341
  return pulumi.get(self, "namespace")
@@ -495,7 +500,7 @@ class _SecretBackendIntermediateCertRequestState:
495
500
  required if `type` is `kms` and it conflicts with `managed_key_id`
496
501
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
497
502
  The value should not contain leading or trailing forward slashes.
498
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
503
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
499
504
  *Available only for Vault Enterprise*.
500
505
  :param pulumi.Input[str] organization: The organization
501
506
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -785,7 +790,7 @@ class _SecretBackendIntermediateCertRequestState:
785
790
  """
786
791
  The namespace to provision the resource in.
787
792
  The value should not contain leading or trailing forward slashes.
788
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
793
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
789
794
  *Available only for Vault Enterprise*.
790
795
  """
791
796
  return pulumi.get(self, "namespace")
@@ -967,10 +972,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
967
972
  import pulumi_vault as vault
968
973
 
969
974
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
970
- backend=vault_mount["pki"]["path"],
975
+ backend=pki["path"],
971
976
  type="internal",
972
977
  common_name="app.my.domain",
973
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
978
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
974
979
  ```
975
980
 
976
981
  :param str resource_name: The name of the resource.
@@ -998,7 +1003,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
998
1003
  required if `type` is `kms` and it conflicts with `managed_key_id`
999
1004
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1000
1005
  The value should not contain leading or trailing forward slashes.
1001
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1006
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1002
1007
  *Available only for Vault Enterprise*.
1003
1008
  :param pulumi.Input[str] organization: The organization
1004
1009
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1025,10 +1030,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1025
1030
  import pulumi_vault as vault
1026
1031
 
1027
1032
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
1028
- backend=vault_mount["pki"]["path"],
1033
+ backend=pki["path"],
1029
1034
  type="internal",
1030
1035
  common_name="app.my.domain",
1031
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1036
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1032
1037
  ```
1033
1038
 
1034
1039
  :param str resource_name: The name of the resource.
@@ -1188,7 +1193,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1188
1193
  required if `type` is `kms` and it conflicts with `managed_key_id`
1189
1194
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1190
1195
  The value should not contain leading or trailing forward slashes.
1191
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1196
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1192
1197
  *Available only for Vault Enterprise*.
1193
1198
  :param pulumi.Input[str] organization: The organization
1194
1199
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1386,7 +1391,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1386
1391
  """
1387
1392
  The namespace to provision the resource in.
1388
1393
  The value should not contain leading or trailing forward slashes.
1389
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1394
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1390
1395
  *Available only for Vault Enterprise*.
1391
1396
  """
1392
1397
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
@@ -25,7 +30,7 @@ class SecretBackendIntermediateSetSignedArgs:
25
30
  issue and sign operations.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  pulumi.set(__self__, "backend", backend)
@@ -65,7 +70,7 @@ class SecretBackendIntermediateSetSignedArgs:
65
70
  """
66
71
  The namespace to provision the resource in.
67
72
  The value should not contain leading or trailing forward slashes.
68
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
73
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
69
74
  *Available only for Vault Enterprise*.
70
75
  """
71
76
  return pulumi.get(self, "namespace")
@@ -94,7 +99,7 @@ class _SecretBackendIntermediateSetSignedState:
94
99
  :param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
95
100
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
96
101
  The value should not contain leading or trailing forward slashes.
97
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
102
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
98
103
  *Available only for Vault Enterprise*.
99
104
  """
100
105
  if backend is not None:
@@ -165,7 +170,7 @@ class _SecretBackendIntermediateSetSignedState:
165
170
  """
166
171
  The namespace to provision the resource in.
167
172
  The value should not contain leading or trailing forward slashes.
168
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
173
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
169
174
  *Available only for Vault Enterprise*.
170
175
  """
171
176
  return pulumi.get(self, "namespace")
@@ -203,7 +208,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
203
208
  description="intermediate",
204
209
  default_lease_ttl_seconds=86400,
205
210
  max_lease_ttl_seconds=86400)
206
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
211
+ example = vault.pki_secret.SecretBackendRootCert("example",
207
212
  backend=root.path,
208
213
  type="internal",
209
214
  common_name="RootOrg Root CA",
@@ -218,11 +223,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
218
223
  country="US",
219
224
  locality="San Francisco",
220
225
  province="CA")
221
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
226
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
222
227
  backend=intermediate.path,
223
- type=example_secret_backend_root_cert.type,
228
+ type=example.type,
224
229
  common_name="SubOrg Intermediate CA")
225
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
230
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
226
231
  backend=root.path,
227
232
  csr=example_secret_backend_intermediate_cert_request.csr,
228
233
  common_name="SubOrg Intermediate CA",
@@ -233,7 +238,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
233
238
  locality="San Francisco",
234
239
  province="CA",
235
240
  revoke=True)
236
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
241
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
237
242
  backend=intermediate.path,
238
243
  certificate=example_secret_backend_root_sign_intermediate.certificate)
239
244
  ```
@@ -246,7 +251,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
246
251
  issue and sign operations.
247
252
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
248
253
  The value should not contain leading or trailing forward slashes.
249
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
254
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
250
255
  *Available only for Vault Enterprise*.
251
256
  """
252
257
  ...
@@ -274,7 +279,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
274
279
  description="intermediate",
275
280
  default_lease_ttl_seconds=86400,
276
281
  max_lease_ttl_seconds=86400)
277
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
282
+ example = vault.pki_secret.SecretBackendRootCert("example",
278
283
  backend=root.path,
279
284
  type="internal",
280
285
  common_name="RootOrg Root CA",
@@ -289,11 +294,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
289
294
  country="US",
290
295
  locality="San Francisco",
291
296
  province="CA")
292
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
297
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
293
298
  backend=intermediate.path,
294
- type=example_secret_backend_root_cert.type,
299
+ type=example.type,
295
300
  common_name="SubOrg Intermediate CA")
296
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
301
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
297
302
  backend=root.path,
298
303
  csr=example_secret_backend_intermediate_cert_request.csr,
299
304
  common_name="SubOrg Intermediate CA",
@@ -304,7 +309,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
304
309
  locality="San Francisco",
305
310
  province="CA",
306
311
  revoke=True)
307
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
312
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
308
313
  backend=intermediate.path,
309
314
  certificate=example_secret_backend_root_sign_intermediate.certificate)
310
315
  ```
@@ -376,7 +381,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
376
381
  :param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
377
382
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
378
383
  The value should not contain leading or trailing forward slashes.
379
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
384
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
380
385
  *Available only for Vault Enterprise*.
381
386
  """
382
387
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -431,7 +436,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
431
436
  """
432
437
  The namespace to provision the resource in.
433
438
  The value should not contain leading or trailing forward slashes.
434
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
439
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
435
440
  *Available only for Vault Enterprise*.
436
441
  """
437
442
  return pulumi.get(self, "namespace")