pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +61 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +218 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  178. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  179. pulumi_vault/pkisecret/secret_backend_role.py +68 -14
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +14 -9
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +60 -6
  189. pulumi_vault/quota_rate_limit.py +56 -2
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  193. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  194. pulumi_vault/raft_autopilot.py +14 -9
  195. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  196. pulumi_vault/rgp_policy.py +14 -9
  197. pulumi_vault/saml/auth_backend.py +22 -17
  198. pulumi_vault/saml/auth_backend_role.py +92 -197
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -71
  203. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  204. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  205. pulumi_vault/secrets/sync_config.py +9 -4
  206. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  207. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  210. pulumi_vault/ssh/_inputs.py +28 -28
  211. pulumi_vault/ssh/outputs.py +11 -28
  212. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  213. pulumi_vault/ssh/secret_backend_role.py +112 -118
  214. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  216. pulumi_vault/terraformcloud/secret_role.py +16 -74
  217. pulumi_vault/token.py +28 -23
  218. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  219. pulumi_vault/transform/alphabet.py +16 -9
  220. pulumi_vault/transform/get_decode.py +45 -17
  221. pulumi_vault/transform/get_encode.py +45 -17
  222. pulumi_vault/transform/role.py +16 -9
  223. pulumi_vault/transform/template.py +30 -21
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -21
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +27 -93
  228. pulumi_vault/transit/secret_cache_config.py +12 -7
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
@@ -44,7 +49,7 @@ class SecretBackendIssuerArgs:
44
49
  computed CAChain field from, when non-empty.
45
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
46
51
  The value should not contain leading or trailing forward slashes.
47
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
48
53
  *Available only for Vault Enterprise*.
49
54
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
50
55
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -182,7 +187,7 @@ class SecretBackendIssuerArgs:
182
187
  """
183
188
  The namespace to provision the resource in.
184
189
  The value should not contain leading or trailing forward slashes.
185
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
190
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
186
191
  *Available only for Vault Enterprise*.
187
192
  """
188
193
  return pulumi.get(self, "namespace")
@@ -264,7 +269,7 @@ class _SecretBackendIssuerState:
264
269
  computed CAChain field from, when non-empty.
265
270
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
266
271
  The value should not contain leading or trailing forward slashes.
267
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
272
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
268
273
  *Available only for Vault Enterprise*.
269
274
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
270
275
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -418,7 +423,7 @@ class _SecretBackendIssuerState:
418
423
  """
419
424
  The namespace to provision the resource in.
420
425
  The value should not contain leading or trailing forward slashes.
421
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
426
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
422
427
  *Available only for Vault Enterprise*.
423
428
  """
424
429
  return pulumi.get(self, "namespace")
@@ -511,7 +516,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
511
516
  PKI secret backend issuer can be imported using the `id`, e.g.
512
517
 
513
518
  ```sh
514
- $ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
519
+ $ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
515
520
  ```
516
521
 
517
522
  :param str resource_name: The name of the resource.
@@ -532,7 +537,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
532
537
  computed CAChain field from, when non-empty.
533
538
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
534
539
  The value should not contain leading or trailing forward slashes.
535
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
540
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
536
541
  *Available only for Vault Enterprise*.
537
542
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
538
543
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -573,7 +578,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
573
578
  PKI secret backend issuer can be imported using the `id`, e.g.
574
579
 
575
580
  ```sh
576
- $ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
581
+ $ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
577
582
  ```
578
583
 
579
584
  :param str resource_name: The name of the resource.
@@ -676,7 +681,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
676
681
  computed CAChain field from, when non-empty.
677
682
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
678
683
  The value should not contain leading or trailing forward slashes.
679
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
684
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
680
685
  *Available only for Vault Enterprise*.
681
686
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
682
687
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -786,7 +791,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
786
791
  """
787
792
  The namespace to provision the resource in.
788
793
  The value should not contain leading or trailing forward slashes.
789
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
794
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
790
795
  *Available only for Vault Enterprise*.
791
796
  """
792
797
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -37,7 +42,7 @@ class SecretBackendKeyArgs:
37
42
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
38
43
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
39
44
  The value should not contain leading or trailing forward slashes.
40
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
45
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
46
  *Available only for Vault Enterprise*.
42
47
  """
43
48
  pulumi.set(__self__, "backend", backend)
@@ -149,7 +154,7 @@ class SecretBackendKeyArgs:
149
154
  """
150
155
  The namespace to provision the resource in.
151
156
  The value should not contain leading or trailing forward slashes.
152
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
158
  *Available only for Vault Enterprise*.
154
159
  """
155
160
  return pulumi.get(self, "namespace")
@@ -186,7 +191,7 @@ class _SecretBackendKeyState:
186
191
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
187
192
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
188
193
  The value should not contain leading or trailing forward slashes.
189
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
194
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
195
  *Available only for Vault Enterprise*.
191
196
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
192
197
  """
@@ -303,7 +308,7 @@ class _SecretBackendKeyState:
303
308
  """
304
309
  The namespace to provision the resource in.
305
310
  The value should not contain leading or trailing forward slashes.
306
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
311
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
307
312
  *Available only for Vault Enterprise*.
308
313
  """
309
314
  return pulumi.get(self, "namespace")
@@ -347,7 +352,7 @@ class SecretBackendKey(pulumi.CustomResource):
347
352
  PKI secret backend key can be imported using the `id`, e.g.
348
353
 
349
354
  ```sh
350
- $ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
355
+ $ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
351
356
  ```
352
357
 
353
358
  :param str resource_name: The name of the resource.
@@ -364,7 +369,7 @@ class SecretBackendKey(pulumi.CustomResource):
364
369
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
365
370
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
366
371
  The value should not contain leading or trailing forward slashes.
367
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
372
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
373
  *Available only for Vault Enterprise*.
369
374
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
370
375
  """
@@ -382,7 +387,7 @@ class SecretBackendKey(pulumi.CustomResource):
382
387
  PKI secret backend key can be imported using the `id`, e.g.
383
388
 
384
389
  ```sh
385
- $ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
390
+ $ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
386
391
  ```
387
392
 
388
393
  :param str resource_name: The name of the resource.
@@ -469,7 +474,7 @@ class SecretBackendKey(pulumi.CustomResource):
469
474
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
470
475
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
471
476
  The value should not contain leading or trailing forward slashes.
472
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
477
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
473
478
  *Available only for Vault Enterprise*.
474
479
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
475
480
  """
@@ -554,7 +559,7 @@ class SecretBackendKey(pulumi.CustomResource):
554
559
  """
555
560
  The namespace to provision the resource in.
556
561
  The value should not contain leading or trailing forward slashes.
557
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
558
563
  *Available only for Vault Enterprise*.
559
564
  """
560
565
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -33,6 +38,7 @@ class SecretBackendRoleArgs:
33
38
  allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
39
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
35
40
  client_flag: Optional[pulumi.Input[bool]] = None,
41
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
36
42
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
37
43
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
38
44
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -81,6 +87,7 @@ class SecretBackendRoleArgs:
81
87
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
82
88
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
83
89
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
90
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
84
91
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
85
92
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
86
93
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -103,7 +110,7 @@ class SecretBackendRoleArgs:
103
110
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
104
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
112
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
114
  *Available only for Vault Enterprise*.
108
115
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
109
116
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -153,6 +160,8 @@ class SecretBackendRoleArgs:
153
160
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
154
161
  if client_flag is not None:
155
162
  pulumi.set(__self__, "client_flag", client_flag)
163
+ if cn_validations is not None:
164
+ pulumi.set(__self__, "cn_validations", cn_validations)
156
165
  if code_signing_flag is not None:
157
166
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
158
167
  if countries is not None:
@@ -416,6 +425,18 @@ class SecretBackendRoleArgs:
416
425
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
417
426
  pulumi.set(self, "client_flag", value)
418
427
 
428
+ @property
429
+ @pulumi.getter(name="cnValidations")
430
+ def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
431
+ """
432
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
433
+ """
434
+ return pulumi.get(self, "cn_validations")
435
+
436
+ @cn_validations.setter
437
+ def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
438
+ pulumi.set(self, "cn_validations", value)
439
+
419
440
  @property
420
441
  @pulumi.getter(name="codeSigningFlag")
421
442
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -596,7 +617,7 @@ class SecretBackendRoleArgs:
596
617
  """
597
618
  The namespace to provision the resource in.
598
619
  The value should not contain leading or trailing forward slashes.
599
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
620
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
600
621
  *Available only for Vault Enterprise*.
601
622
  """
602
623
  return pulumi.get(self, "namespace")
@@ -794,6 +815,7 @@ class _SecretBackendRoleState:
794
815
  backend: Optional[pulumi.Input[str]] = None,
795
816
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
796
817
  client_flag: Optional[pulumi.Input[bool]] = None,
818
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
797
819
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
798
820
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
799
821
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -842,6 +864,7 @@ class _SecretBackendRoleState:
842
864
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
843
865
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
844
866
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
867
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
845
868
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
846
869
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
847
870
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -864,7 +887,7 @@ class _SecretBackendRoleState:
864
887
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
865
888
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
866
889
  The value should not contain leading or trailing forward slashes.
867
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
890
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
868
891
  *Available only for Vault Enterprise*.
869
892
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
870
893
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -915,6 +938,8 @@ class _SecretBackendRoleState:
915
938
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
916
939
  if client_flag is not None:
917
940
  pulumi.set(__self__, "client_flag", client_flag)
941
+ if cn_validations is not None:
942
+ pulumi.set(__self__, "cn_validations", cn_validations)
918
943
  if code_signing_flag is not None:
919
944
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
920
945
  if countries is not None:
@@ -1178,6 +1203,18 @@ class _SecretBackendRoleState:
1178
1203
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
1179
1204
  pulumi.set(self, "client_flag", value)
1180
1205
 
1206
+ @property
1207
+ @pulumi.getter(name="cnValidations")
1208
+ def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1209
+ """
1210
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1211
+ """
1212
+ return pulumi.get(self, "cn_validations")
1213
+
1214
+ @cn_validations.setter
1215
+ def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1216
+ pulumi.set(self, "cn_validations", value)
1217
+
1181
1218
  @property
1182
1219
  @pulumi.getter(name="codeSigningFlag")
1183
1220
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -1358,7 +1395,7 @@ class _SecretBackendRoleState:
1358
1395
  """
1359
1396
  The namespace to provision the resource in.
1360
1397
  The value should not contain leading or trailing forward slashes.
1361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1362
1399
  *Available only for Vault Enterprise*.
1363
1400
  """
1364
1401
  return pulumi.get(self, "namespace")
@@ -1558,6 +1595,7 @@ class SecretBackendRole(pulumi.CustomResource):
1558
1595
  backend: Optional[pulumi.Input[str]] = None,
1559
1596
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1560
1597
  client_flag: Optional[pulumi.Input[bool]] = None,
1598
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1561
1599
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1562
1600
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1563
1601
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1577,7 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
1577
1615
  not_before_duration: Optional[pulumi.Input[str]] = None,
1578
1616
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1579
1617
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1580
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1618
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1581
1619
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1582
1620
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1583
1621
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1604,6 +1642,7 @@ class SecretBackendRole(pulumi.CustomResource):
1604
1642
  max_lease_ttl_seconds=86400)
1605
1643
  role = vault.pki_secret.SecretBackendRole("role",
1606
1644
  backend=pki.path,
1645
+ name="my_role",
1607
1646
  ttl="3600",
1608
1647
  allow_ip_sans=True,
1609
1648
  key_type="rsa",
@@ -1620,7 +1659,7 @@ class SecretBackendRole(pulumi.CustomResource):
1620
1659
  PKI secret backend roles can be imported using the `path`, e.g.
1621
1660
 
1622
1661
  ```sh
1623
- $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1662
+ $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1624
1663
  ```
1625
1664
 
1626
1665
  :param str resource_name: The name of the resource.
@@ -1642,6 +1681,7 @@ class SecretBackendRole(pulumi.CustomResource):
1642
1681
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1643
1682
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1644
1683
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1684
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1645
1685
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1646
1686
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1647
1687
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -1664,13 +1704,13 @@ class SecretBackendRole(pulumi.CustomResource):
1664
1704
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1665
1705
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1666
1706
  The value should not contain leading or trailing forward slashes.
1667
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1707
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1668
1708
  *Available only for Vault Enterprise*.
1669
1709
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1670
1710
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1671
1711
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1672
1712
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1673
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1713
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1674
1714
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1675
1715
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1676
1716
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1703,6 +1743,7 @@ class SecretBackendRole(pulumi.CustomResource):
1703
1743
  max_lease_ttl_seconds=86400)
1704
1744
  role = vault.pki_secret.SecretBackendRole("role",
1705
1745
  backend=pki.path,
1746
+ name="my_role",
1706
1747
  ttl="3600",
1707
1748
  allow_ip_sans=True,
1708
1749
  key_type="rsa",
@@ -1719,7 +1760,7 @@ class SecretBackendRole(pulumi.CustomResource):
1719
1760
  PKI secret backend roles can be imported using the `path`, e.g.
1720
1761
 
1721
1762
  ```sh
1722
- $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1763
+ $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1723
1764
  ```
1724
1765
 
1725
1766
  :param str resource_name: The name of the resource.
@@ -1754,6 +1795,7 @@ class SecretBackendRole(pulumi.CustomResource):
1754
1795
  backend: Optional[pulumi.Input[str]] = None,
1755
1796
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1756
1797
  client_flag: Optional[pulumi.Input[bool]] = None,
1798
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1757
1799
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1758
1800
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1759
1801
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1773,7 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
1773
1815
  not_before_duration: Optional[pulumi.Input[str]] = None,
1774
1816
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1775
1817
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1776
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1818
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1777
1819
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1778
1820
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1779
1821
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1811,6 +1853,7 @@ class SecretBackendRole(pulumi.CustomResource):
1811
1853
  __props__.__dict__["backend"] = backend
1812
1854
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
1813
1855
  __props__.__dict__["client_flag"] = client_flag
1856
+ __props__.__dict__["cn_validations"] = cn_validations
1814
1857
  __props__.__dict__["code_signing_flag"] = code_signing_flag
1815
1858
  __props__.__dict__["countries"] = countries
1816
1859
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -1867,6 +1910,7 @@ class SecretBackendRole(pulumi.CustomResource):
1867
1910
  backend: Optional[pulumi.Input[str]] = None,
1868
1911
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1869
1912
  client_flag: Optional[pulumi.Input[bool]] = None,
1913
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1870
1914
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1871
1915
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1872
1916
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1886,7 +1930,7 @@ class SecretBackendRole(pulumi.CustomResource):
1886
1930
  not_before_duration: Optional[pulumi.Input[str]] = None,
1887
1931
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1888
1932
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1889
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1933
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1890
1934
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1891
1935
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1892
1936
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1920,6 +1964,7 @@ class SecretBackendRole(pulumi.CustomResource):
1920
1964
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1921
1965
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1922
1966
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1967
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1923
1968
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1924
1969
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1925
1970
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -1942,13 +1987,13 @@ class SecretBackendRole(pulumi.CustomResource):
1942
1987
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1943
1988
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1944
1989
  The value should not contain leading or trailing forward slashes.
1945
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1990
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1946
1991
  *Available only for Vault Enterprise*.
1947
1992
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1948
1993
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1949
1994
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1950
1995
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1951
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1996
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1952
1997
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1953
1998
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1954
1999
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1980,6 +2025,7 @@ class SecretBackendRole(pulumi.CustomResource):
1980
2025
  __props__.__dict__["backend"] = backend
1981
2026
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
1982
2027
  __props__.__dict__["client_flag"] = client_flag
2028
+ __props__.__dict__["cn_validations"] = cn_validations
1983
2029
  __props__.__dict__["code_signing_flag"] = code_signing_flag
1984
2030
  __props__.__dict__["countries"] = countries
1985
2031
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -2147,6 +2193,14 @@ class SecretBackendRole(pulumi.CustomResource):
2147
2193
  """
2148
2194
  return pulumi.get(self, "client_flag")
2149
2195
 
2196
+ @property
2197
+ @pulumi.getter(name="cnValidations")
2198
+ def cn_validations(self) -> pulumi.Output[Sequence[str]]:
2199
+ """
2200
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
2201
+ """
2202
+ return pulumi.get(self, "cn_validations")
2203
+
2150
2204
  @property
2151
2205
  @pulumi.getter(name="codeSigningFlag")
2152
2206
  def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
@@ -2271,7 +2325,7 @@ class SecretBackendRole(pulumi.CustomResource):
2271
2325
  """
2272
2326
  The namespace to provision the resource in.
2273
2327
  The value should not contain leading or trailing forward slashes.
2274
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
2328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
2275
2329
  *Available only for Vault Enterprise*.
2276
2330
  """
2277
2331
  return pulumi.get(self, "namespace")