pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +61 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +218 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +68 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +112 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
19
25
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
21
27
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
|
|
23
29
|
The set of arguments for constructing a SecretBackendConfigUrls resource.
|
24
30
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
25
31
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
32
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
26
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
27
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
35
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
37
|
*Available only for Vault Enterprise*.
|
31
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
32
39
|
"""
|
33
40
|
pulumi.set(__self__, "backend", backend)
|
34
41
|
if crl_distribution_points is not None:
|
35
42
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
43
|
+
if enable_templating is not None:
|
44
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
36
45
|
if issuing_certificates is not None:
|
37
46
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
38
47
|
if namespace is not None:
|
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
|
|
64
73
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
65
74
|
pulumi.set(self, "crl_distribution_points", value)
|
66
75
|
|
76
|
+
@property
|
77
|
+
@pulumi.getter(name="enableTemplating")
|
78
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
79
|
+
"""
|
80
|
+
Specifies that templating of AIA fields is allowed.
|
81
|
+
"""
|
82
|
+
return pulumi.get(self, "enable_templating")
|
83
|
+
|
84
|
+
@enable_templating.setter
|
85
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
86
|
+
pulumi.set(self, "enable_templating", value)
|
87
|
+
|
67
88
|
@property
|
68
89
|
@pulumi.getter(name="issuingCertificates")
|
69
90
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
|
|
82
103
|
"""
|
83
104
|
The namespace to provision the resource in.
|
84
105
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
106
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
107
|
*Available only for Vault Enterprise*.
|
87
108
|
"""
|
88
109
|
return pulumi.get(self, "namespace")
|
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
|
|
109
130
|
def __init__(__self__, *,
|
110
131
|
backend: Optional[pulumi.Input[str]] = None,
|
111
132
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
133
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
112
134
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
113
135
|
namespace: Optional[pulumi.Input[str]] = None,
|
114
136
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
|
|
116
138
|
Input properties used for looking up and filtering SecretBackendConfigUrls resources.
|
117
139
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
118
140
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
141
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
119
142
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
120
143
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
144
|
The value should not contain leading or trailing forward slashes.
|
122
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
123
146
|
*Available only for Vault Enterprise*.
|
124
147
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
125
148
|
"""
|
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
|
|
127
150
|
pulumi.set(__self__, "backend", backend)
|
128
151
|
if crl_distribution_points is not None:
|
129
152
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
153
|
+
if enable_templating is not None:
|
154
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
130
155
|
if issuing_certificates is not None:
|
131
156
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
132
157
|
if namespace is not None:
|
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
|
|
158
183
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
159
184
|
pulumi.set(self, "crl_distribution_points", value)
|
160
185
|
|
186
|
+
@property
|
187
|
+
@pulumi.getter(name="enableTemplating")
|
188
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
189
|
+
"""
|
190
|
+
Specifies that templating of AIA fields is allowed.
|
191
|
+
"""
|
192
|
+
return pulumi.get(self, "enable_templating")
|
193
|
+
|
194
|
+
@enable_templating.setter
|
195
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
196
|
+
pulumi.set(self, "enable_templating", value)
|
197
|
+
|
161
198
|
@property
|
162
199
|
@pulumi.getter(name="issuingCertificates")
|
163
200
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
|
|
176
213
|
"""
|
177
214
|
The namespace to provision the resource in.
|
178
215
|
The value should not contain leading or trailing forward slashes.
|
179
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
217
|
*Available only for Vault Enterprise*.
|
181
218
|
"""
|
182
219
|
return pulumi.get(self, "namespace")
|
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
205
242
|
opts: Optional[pulumi.ResourceOptions] = None,
|
206
243
|
backend: Optional[pulumi.Input[str]] = None,
|
207
244
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
245
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
208
246
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
209
247
|
namespace: Optional[pulumi.Input[str]] = None,
|
210
248
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -231,20 +269,23 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
231
269
|
|
232
270
|
## Import
|
233
271
|
|
234
|
-
The PKI config URLs can be imported using the resource's `id`.
|
272
|
+
The PKI config URLs can be imported using the resource's `id`.
|
273
|
+
In the case of the example above the `id` would be `pki-root/config/urls`,
|
274
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
235
275
|
|
236
276
|
```sh
|
237
|
-
|
277
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
|
238
278
|
```
|
239
279
|
|
240
280
|
:param str resource_name: The name of the resource.
|
241
281
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
242
282
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
243
283
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
284
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
244
285
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
245
286
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
246
287
|
The value should not contain leading or trailing forward slashes.
|
247
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
288
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
248
289
|
*Available only for Vault Enterprise*.
|
249
290
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
250
291
|
"""
|
@@ -276,10 +317,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
276
317
|
|
277
318
|
## Import
|
278
319
|
|
279
|
-
The PKI config URLs can be imported using the resource's `id`.
|
320
|
+
The PKI config URLs can be imported using the resource's `id`.
|
321
|
+
In the case of the example above the `id` would be `pki-root/config/urls`,
|
322
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
280
323
|
|
281
324
|
```sh
|
282
|
-
|
325
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
|
283
326
|
```
|
284
327
|
|
285
328
|
:param str resource_name: The name of the resource.
|
@@ -299,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
299
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
300
343
|
backend: Optional[pulumi.Input[str]] = None,
|
301
344
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
345
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
302
346
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
303
347
|
namespace: Optional[pulumi.Input[str]] = None,
|
304
348
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -315,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
315
359
|
raise TypeError("Missing required property 'backend'")
|
316
360
|
__props__.__dict__["backend"] = backend
|
317
361
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
362
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
318
363
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
319
364
|
__props__.__dict__["namespace"] = namespace
|
320
365
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -330,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
330
375
|
opts: Optional[pulumi.ResourceOptions] = None,
|
331
376
|
backend: Optional[pulumi.Input[str]] = None,
|
332
377
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
378
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
333
379
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
334
380
|
namespace: Optional[pulumi.Input[str]] = None,
|
335
381
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
|
@@ -342,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
342
388
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
343
389
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
344
390
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
391
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
345
392
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
346
393
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
347
394
|
The value should not contain leading or trailing forward slashes.
|
348
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
395
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
349
396
|
*Available only for Vault Enterprise*.
|
350
397
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
351
398
|
"""
|
@@ -355,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
355
402
|
|
356
403
|
__props__.__dict__["backend"] = backend
|
357
404
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
405
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
358
406
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
359
407
|
__props__.__dict__["namespace"] = namespace
|
360
408
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -376,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
376
424
|
"""
|
377
425
|
return pulumi.get(self, "crl_distribution_points")
|
378
426
|
|
427
|
+
@property
|
428
|
+
@pulumi.getter(name="enableTemplating")
|
429
|
+
def enable_templating(self) -> pulumi.Output[Optional[bool]]:
|
430
|
+
"""
|
431
|
+
Specifies that templating of AIA fields is allowed.
|
432
|
+
"""
|
433
|
+
return pulumi.get(self, "enable_templating")
|
434
|
+
|
379
435
|
@property
|
380
436
|
@pulumi.getter(name="issuingCertificates")
|
381
437
|
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -390,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
390
446
|
"""
|
391
447
|
The namespace to provision the resource in.
|
392
448
|
The value should not contain leading or trailing forward slashes.
|
393
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
449
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
394
450
|
*Available only for Vault Enterprise*.
|
395
451
|
"""
|
396
452
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
|
@@ -40,7 +45,7 @@ class SecretBackendCrlConfigArgs:
|
|
40
45
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
41
46
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
42
47
|
The value should not contain leading or trailing forward slashes.
|
43
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
48
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
49
|
*Available only for Vault Enterprise*.
|
45
50
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
46
51
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -178,7 +183,7 @@ class SecretBackendCrlConfigArgs:
|
|
178
183
|
"""
|
179
184
|
The namespace to provision the resource in.
|
180
185
|
The value should not contain leading or trailing forward slashes.
|
181
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
186
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
182
187
|
*Available only for Vault Enterprise*.
|
183
188
|
"""
|
184
189
|
return pulumi.get(self, "namespace")
|
@@ -267,7 +272,7 @@ class _SecretBackendCrlConfigState:
|
|
267
272
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
268
273
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
269
274
|
The value should not contain leading or trailing forward slashes.
|
270
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
275
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
276
|
*Available only for Vault Enterprise*.
|
272
277
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
273
278
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -406,7 +411,7 @@ class _SecretBackendCrlConfigState:
|
|
406
411
|
"""
|
407
412
|
The namespace to provision the resource in.
|
408
413
|
The value should not contain leading or trailing forward slashes.
|
409
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
414
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
410
415
|
*Available only for Vault Enterprise*.
|
411
416
|
"""
|
412
417
|
return pulumi.get(self, "namespace")
|
@@ -499,7 +504,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
499
504
|
type="pki",
|
500
505
|
default_lease_ttl_seconds=3600,
|
501
506
|
max_lease_ttl_seconds=86400)
|
502
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
507
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
503
508
|
backend=pki.path,
|
504
509
|
expiry="72h",
|
505
510
|
disable=False)
|
@@ -518,7 +523,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
518
523
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
519
524
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
520
525
|
The value should not contain leading or trailing forward slashes.
|
521
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
526
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
522
527
|
*Available only for Vault Enterprise*.
|
523
528
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
524
529
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -547,7 +552,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
547
552
|
type="pki",
|
548
553
|
default_lease_ttl_seconds=3600,
|
549
554
|
max_lease_ttl_seconds=86400)
|
550
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
555
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
551
556
|
backend=pki.path,
|
552
557
|
expiry="72h",
|
553
558
|
disable=False)
|
@@ -646,7 +651,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
646
651
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
647
652
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
648
653
|
The value should not contain leading or trailing forward slashes.
|
649
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
654
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
650
655
|
*Available only for Vault Enterprise*.
|
651
656
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
652
657
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -745,7 +750,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
745
750
|
"""
|
746
751
|
The namespace to provision the resource in.
|
747
752
|
The value should not contain leading or trailing forward slashes.
|
748
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
753
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
749
754
|
*Available only for Vault Enterprise*.
|
750
755
|
"""
|
751
756
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
|
@@ -66,7 +71,7 @@ class SecretBackendIntermediateCertRequestArgs:
|
|
66
71
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
67
72
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
68
73
|
The value should not contain leading or trailing forward slashes.
|
69
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
74
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
70
75
|
*Available only for Vault Enterprise*.
|
71
76
|
:param pulumi.Input[str] organization: The organization
|
72
77
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -330,7 +335,7 @@ class SecretBackendIntermediateCertRequestArgs:
|
|
330
335
|
"""
|
331
336
|
The namespace to provision the resource in.
|
332
337
|
The value should not contain leading or trailing forward slashes.
|
333
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
338
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
334
339
|
*Available only for Vault Enterprise*.
|
335
340
|
"""
|
336
341
|
return pulumi.get(self, "namespace")
|
@@ -495,7 +500,7 @@ class _SecretBackendIntermediateCertRequestState:
|
|
495
500
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
496
501
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
497
502
|
The value should not contain leading or trailing forward slashes.
|
498
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
503
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
499
504
|
*Available only for Vault Enterprise*.
|
500
505
|
:param pulumi.Input[str] organization: The organization
|
501
506
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -785,7 +790,7 @@ class _SecretBackendIntermediateCertRequestState:
|
|
785
790
|
"""
|
786
791
|
The namespace to provision the resource in.
|
787
792
|
The value should not contain leading or trailing forward slashes.
|
788
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
793
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
789
794
|
*Available only for Vault Enterprise*.
|
790
795
|
"""
|
791
796
|
return pulumi.get(self, "namespace")
|
@@ -967,10 +972,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
967
972
|
import pulumi_vault as vault
|
968
973
|
|
969
974
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
970
|
-
backend=
|
975
|
+
backend=pki["path"],
|
971
976
|
type="internal",
|
972
977
|
common_name="app.my.domain",
|
973
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
978
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
974
979
|
```
|
975
980
|
|
976
981
|
:param str resource_name: The name of the resource.
|
@@ -998,7 +1003,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
998
1003
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
999
1004
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1000
1005
|
The value should not contain leading or trailing forward slashes.
|
1001
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1006
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1002
1007
|
*Available only for Vault Enterprise*.
|
1003
1008
|
:param pulumi.Input[str] organization: The organization
|
1004
1009
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1025,10 +1030,10 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1025
1030
|
import pulumi_vault as vault
|
1026
1031
|
|
1027
1032
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
1028
|
-
backend=
|
1033
|
+
backend=pki["path"],
|
1029
1034
|
type="internal",
|
1030
1035
|
common_name="app.my.domain",
|
1031
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1036
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1032
1037
|
```
|
1033
1038
|
|
1034
1039
|
:param str resource_name: The name of the resource.
|
@@ -1188,7 +1193,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1188
1193
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
1189
1194
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1190
1195
|
The value should not contain leading or trailing forward slashes.
|
1191
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1196
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1192
1197
|
*Available only for Vault Enterprise*.
|
1193
1198
|
:param pulumi.Input[str] organization: The organization
|
1194
1199
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1386,7 +1391,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1386
1391
|
"""
|
1387
1392
|
The namespace to provision the resource in.
|
1388
1393
|
The value should not contain leading or trailing forward slashes.
|
1389
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1394
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1390
1395
|
*Available only for Vault Enterprise*.
|
1391
1396
|
"""
|
1392
1397
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
|
@@ -25,7 +30,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
25
30
|
issue and sign operations.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "backend", backend)
|
@@ -65,7 +70,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
65
70
|
"""
|
66
71
|
The namespace to provision the resource in.
|
67
72
|
The value should not contain leading or trailing forward slashes.
|
68
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
73
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
69
74
|
*Available only for Vault Enterprise*.
|
70
75
|
"""
|
71
76
|
return pulumi.get(self, "namespace")
|
@@ -94,7 +99,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
94
99
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
95
100
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
96
101
|
The value should not contain leading or trailing forward slashes.
|
97
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
102
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
98
103
|
*Available only for Vault Enterprise*.
|
99
104
|
"""
|
100
105
|
if backend is not None:
|
@@ -165,7 +170,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
165
170
|
"""
|
166
171
|
The namespace to provision the resource in.
|
167
172
|
The value should not contain leading or trailing forward slashes.
|
168
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
173
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
169
174
|
*Available only for Vault Enterprise*.
|
170
175
|
"""
|
171
176
|
return pulumi.get(self, "namespace")
|
@@ -203,7 +208,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
203
208
|
description="intermediate",
|
204
209
|
default_lease_ttl_seconds=86400,
|
205
210
|
max_lease_ttl_seconds=86400)
|
206
|
-
|
211
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
207
212
|
backend=root.path,
|
208
213
|
type="internal",
|
209
214
|
common_name="RootOrg Root CA",
|
@@ -218,11 +223,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
218
223
|
country="US",
|
219
224
|
locality="San Francisco",
|
220
225
|
province="CA")
|
221
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
226
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
222
227
|
backend=intermediate.path,
|
223
|
-
type=
|
228
|
+
type=example.type,
|
224
229
|
common_name="SubOrg Intermediate CA")
|
225
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
230
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
226
231
|
backend=root.path,
|
227
232
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
228
233
|
common_name="SubOrg Intermediate CA",
|
@@ -233,7 +238,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
233
238
|
locality="San Francisco",
|
234
239
|
province="CA",
|
235
240
|
revoke=True)
|
236
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
241
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
237
242
|
backend=intermediate.path,
|
238
243
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
239
244
|
```
|
@@ -246,7 +251,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
246
251
|
issue and sign operations.
|
247
252
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
248
253
|
The value should not contain leading or trailing forward slashes.
|
249
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
254
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
250
255
|
*Available only for Vault Enterprise*.
|
251
256
|
"""
|
252
257
|
...
|
@@ -274,7 +279,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
274
279
|
description="intermediate",
|
275
280
|
default_lease_ttl_seconds=86400,
|
276
281
|
max_lease_ttl_seconds=86400)
|
277
|
-
|
282
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
278
283
|
backend=root.path,
|
279
284
|
type="internal",
|
280
285
|
common_name="RootOrg Root CA",
|
@@ -289,11 +294,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
289
294
|
country="US",
|
290
295
|
locality="San Francisco",
|
291
296
|
province="CA")
|
292
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
297
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
293
298
|
backend=intermediate.path,
|
294
|
-
type=
|
299
|
+
type=example.type,
|
295
300
|
common_name="SubOrg Intermediate CA")
|
296
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
301
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
297
302
|
backend=root.path,
|
298
303
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
299
304
|
common_name="SubOrg Intermediate CA",
|
@@ -304,7 +309,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
304
309
|
locality="San Francisco",
|
305
310
|
province="CA",
|
306
311
|
revoke=True)
|
307
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
312
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
308
313
|
backend=intermediate.path,
|
309
314
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
310
315
|
```
|
@@ -376,7 +381,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
376
381
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
377
382
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
378
383
|
The value should not contain leading or trailing forward slashes.
|
379
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
384
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
380
385
|
*Available only for Vault Enterprise*.
|
381
386
|
"""
|
382
387
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -431,7 +436,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
431
436
|
"""
|
432
437
|
The namespace to provision the resource in.
|
433
438
|
The value should not contain leading or trailing forward slashes.
|
434
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
439
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
435
440
|
*Available only for Vault Enterprise*.
|
436
441
|
"""
|
437
442
|
return pulumi.get(self, "namespace")
|