pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +61 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +218 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +68 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +112 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
@@ -44,7 +49,7 @@ class SecretBackendIssuerArgs:
|
|
44
49
|
computed CAChain field from, when non-empty.
|
45
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
51
|
The value should not contain leading or trailing forward slashes.
|
47
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
53
|
*Available only for Vault Enterprise*.
|
49
54
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
50
55
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -182,7 +187,7 @@ class SecretBackendIssuerArgs:
|
|
182
187
|
"""
|
183
188
|
The namespace to provision the resource in.
|
184
189
|
The value should not contain leading or trailing forward slashes.
|
185
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
190
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
186
191
|
*Available only for Vault Enterprise*.
|
187
192
|
"""
|
188
193
|
return pulumi.get(self, "namespace")
|
@@ -264,7 +269,7 @@ class _SecretBackendIssuerState:
|
|
264
269
|
computed CAChain field from, when non-empty.
|
265
270
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
266
271
|
The value should not contain leading or trailing forward slashes.
|
267
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
272
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
268
273
|
*Available only for Vault Enterprise*.
|
269
274
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
270
275
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -418,7 +423,7 @@ class _SecretBackendIssuerState:
|
|
418
423
|
"""
|
419
424
|
The namespace to provision the resource in.
|
420
425
|
The value should not contain leading or trailing forward slashes.
|
421
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
426
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
422
427
|
*Available only for Vault Enterprise*.
|
423
428
|
"""
|
424
429
|
return pulumi.get(self, "namespace")
|
@@ -511,7 +516,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
511
516
|
PKI secret backend issuer can be imported using the `id`, e.g.
|
512
517
|
|
513
518
|
```sh
|
514
|
-
|
519
|
+
$ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
|
515
520
|
```
|
516
521
|
|
517
522
|
:param str resource_name: The name of the resource.
|
@@ -532,7 +537,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
532
537
|
computed CAChain field from, when non-empty.
|
533
538
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
534
539
|
The value should not contain leading or trailing forward slashes.
|
535
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
540
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
536
541
|
*Available only for Vault Enterprise*.
|
537
542
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
538
543
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -573,7 +578,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
573
578
|
PKI secret backend issuer can be imported using the `id`, e.g.
|
574
579
|
|
575
580
|
```sh
|
576
|
-
|
581
|
+
$ pulumi import vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer example pki/issuer/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
|
577
582
|
```
|
578
583
|
|
579
584
|
:param str resource_name: The name of the resource.
|
@@ -676,7 +681,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
676
681
|
computed CAChain field from, when non-empty.
|
677
682
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
678
683
|
The value should not contain leading or trailing forward slashes.
|
679
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
684
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
680
685
|
*Available only for Vault Enterprise*.
|
681
686
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
682
687
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -786,7 +791,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
786
791
|
"""
|
787
792
|
The namespace to provision the resource in.
|
788
793
|
The value should not contain leading or trailing forward slashes.
|
789
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
794
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
790
795
|
*Available only for Vault Enterprise*.
|
791
796
|
"""
|
792
797
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -37,7 +42,7 @@ class SecretBackendKeyArgs:
|
|
37
42
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
38
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
39
44
|
The value should not contain leading or trailing forward slashes.
|
40
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
45
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
46
|
*Available only for Vault Enterprise*.
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "backend", backend)
|
@@ -149,7 +154,7 @@ class SecretBackendKeyArgs:
|
|
149
154
|
"""
|
150
155
|
The namespace to provision the resource in.
|
151
156
|
The value should not contain leading or trailing forward slashes.
|
152
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
158
|
*Available only for Vault Enterprise*.
|
154
159
|
"""
|
155
160
|
return pulumi.get(self, "namespace")
|
@@ -186,7 +191,7 @@ class _SecretBackendKeyState:
|
|
186
191
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
187
192
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
188
193
|
The value should not contain leading or trailing forward slashes.
|
189
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
194
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
195
|
*Available only for Vault Enterprise*.
|
191
196
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
192
197
|
"""
|
@@ -303,7 +308,7 @@ class _SecretBackendKeyState:
|
|
303
308
|
"""
|
304
309
|
The namespace to provision the resource in.
|
305
310
|
The value should not contain leading or trailing forward slashes.
|
306
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
311
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
307
312
|
*Available only for Vault Enterprise*.
|
308
313
|
"""
|
309
314
|
return pulumi.get(self, "namespace")
|
@@ -347,7 +352,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
347
352
|
PKI secret backend key can be imported using the `id`, e.g.
|
348
353
|
|
349
354
|
```sh
|
350
|
-
|
355
|
+
$ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
|
351
356
|
```
|
352
357
|
|
353
358
|
:param str resource_name: The name of the resource.
|
@@ -364,7 +369,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
364
369
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
365
370
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
366
371
|
The value should not contain leading or trailing forward slashes.
|
367
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
372
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
373
|
*Available only for Vault Enterprise*.
|
369
374
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
370
375
|
"""
|
@@ -382,7 +387,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
382
387
|
PKI secret backend key can be imported using the `id`, e.g.
|
383
388
|
|
384
389
|
```sh
|
385
|
-
|
390
|
+
$ pulumi import vault:pkiSecret/secretBackendKey:SecretBackendKey key pki/key/bf9b0d48-d0dd-652c-30be-77d04fc7e94d
|
386
391
|
```
|
387
392
|
|
388
393
|
:param str resource_name: The name of the resource.
|
@@ -469,7 +474,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
469
474
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
470
475
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
471
476
|
The value should not contain leading or trailing forward slashes.
|
472
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
477
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
473
478
|
*Available only for Vault Enterprise*.
|
474
479
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
475
480
|
"""
|
@@ -554,7 +559,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
554
559
|
"""
|
555
560
|
The namespace to provision the resource in.
|
556
561
|
The value should not contain leading or trailing forward slashes.
|
557
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
558
563
|
*Available only for Vault Enterprise*.
|
559
564
|
"""
|
560
565
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -33,6 +38,7 @@ class SecretBackendRoleArgs:
|
|
33
38
|
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
39
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
35
40
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
41
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
42
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
37
43
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
38
44
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -81,6 +87,7 @@ class SecretBackendRoleArgs:
|
|
81
87
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
|
82
88
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
83
89
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
90
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
84
91
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
85
92
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
86
93
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -103,7 +110,7 @@ class SecretBackendRoleArgs:
|
|
103
110
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
104
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
112
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
114
|
*Available only for Vault Enterprise*.
|
108
115
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
109
116
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -153,6 +160,8 @@ class SecretBackendRoleArgs:
|
|
153
160
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
154
161
|
if client_flag is not None:
|
155
162
|
pulumi.set(__self__, "client_flag", client_flag)
|
163
|
+
if cn_validations is not None:
|
164
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
156
165
|
if code_signing_flag is not None:
|
157
166
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
158
167
|
if countries is not None:
|
@@ -416,6 +425,18 @@ class SecretBackendRoleArgs:
|
|
416
425
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
417
426
|
pulumi.set(self, "client_flag", value)
|
418
427
|
|
428
|
+
@property
|
429
|
+
@pulumi.getter(name="cnValidations")
|
430
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
431
|
+
"""
|
432
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
433
|
+
"""
|
434
|
+
return pulumi.get(self, "cn_validations")
|
435
|
+
|
436
|
+
@cn_validations.setter
|
437
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
438
|
+
pulumi.set(self, "cn_validations", value)
|
439
|
+
|
419
440
|
@property
|
420
441
|
@pulumi.getter(name="codeSigningFlag")
|
421
442
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -596,7 +617,7 @@ class SecretBackendRoleArgs:
|
|
596
617
|
"""
|
597
618
|
The namespace to provision the resource in.
|
598
619
|
The value should not contain leading or trailing forward slashes.
|
599
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
620
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
600
621
|
*Available only for Vault Enterprise*.
|
601
622
|
"""
|
602
623
|
return pulumi.get(self, "namespace")
|
@@ -794,6 +815,7 @@ class _SecretBackendRoleState:
|
|
794
815
|
backend: Optional[pulumi.Input[str]] = None,
|
795
816
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
796
817
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
818
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
797
819
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
798
820
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
799
821
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -842,6 +864,7 @@ class _SecretBackendRoleState:
|
|
842
864
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
843
865
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
844
866
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
867
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
845
868
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
846
869
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
847
870
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -864,7 +887,7 @@ class _SecretBackendRoleState:
|
|
864
887
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
865
888
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
866
889
|
The value should not contain leading or trailing forward slashes.
|
867
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
890
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
868
891
|
*Available only for Vault Enterprise*.
|
869
892
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
870
893
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -915,6 +938,8 @@ class _SecretBackendRoleState:
|
|
915
938
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
916
939
|
if client_flag is not None:
|
917
940
|
pulumi.set(__self__, "client_flag", client_flag)
|
941
|
+
if cn_validations is not None:
|
942
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
918
943
|
if code_signing_flag is not None:
|
919
944
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
920
945
|
if countries is not None:
|
@@ -1178,6 +1203,18 @@ class _SecretBackendRoleState:
|
|
1178
1203
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
1179
1204
|
pulumi.set(self, "client_flag", value)
|
1180
1205
|
|
1206
|
+
@property
|
1207
|
+
@pulumi.getter(name="cnValidations")
|
1208
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1209
|
+
"""
|
1210
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1211
|
+
"""
|
1212
|
+
return pulumi.get(self, "cn_validations")
|
1213
|
+
|
1214
|
+
@cn_validations.setter
|
1215
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1216
|
+
pulumi.set(self, "cn_validations", value)
|
1217
|
+
|
1181
1218
|
@property
|
1182
1219
|
@pulumi.getter(name="codeSigningFlag")
|
1183
1220
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1358,7 +1395,7 @@ class _SecretBackendRoleState:
|
|
1358
1395
|
"""
|
1359
1396
|
The namespace to provision the resource in.
|
1360
1397
|
The value should not contain leading or trailing forward slashes.
|
1361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1362
1399
|
*Available only for Vault Enterprise*.
|
1363
1400
|
"""
|
1364
1401
|
return pulumi.get(self, "namespace")
|
@@ -1558,6 +1595,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1558
1595
|
backend: Optional[pulumi.Input[str]] = None,
|
1559
1596
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1560
1597
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1598
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1561
1599
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1562
1600
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1563
1601
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1577,7 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1577
1615
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1578
1616
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1579
1617
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1580
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1618
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1581
1619
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1582
1620
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1583
1621
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1604,6 +1642,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1604
1642
|
max_lease_ttl_seconds=86400)
|
1605
1643
|
role = vault.pki_secret.SecretBackendRole("role",
|
1606
1644
|
backend=pki.path,
|
1645
|
+
name="my_role",
|
1607
1646
|
ttl="3600",
|
1608
1647
|
allow_ip_sans=True,
|
1609
1648
|
key_type="rsa",
|
@@ -1620,7 +1659,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1620
1659
|
PKI secret backend roles can be imported using the `path`, e.g.
|
1621
1660
|
|
1622
1661
|
```sh
|
1623
|
-
|
1662
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
1624
1663
|
```
|
1625
1664
|
|
1626
1665
|
:param str resource_name: The name of the resource.
|
@@ -1642,6 +1681,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1642
1681
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1643
1682
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1644
1683
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1684
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1645
1685
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1646
1686
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1647
1687
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -1664,13 +1704,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1664
1704
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1665
1705
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1666
1706
|
The value should not contain leading or trailing forward slashes.
|
1667
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1707
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1668
1708
|
*Available only for Vault Enterprise*.
|
1669
1709
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1670
1710
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1671
1711
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1672
1712
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1673
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1713
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1674
1714
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1675
1715
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1676
1716
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1703,6 +1743,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1703
1743
|
max_lease_ttl_seconds=86400)
|
1704
1744
|
role = vault.pki_secret.SecretBackendRole("role",
|
1705
1745
|
backend=pki.path,
|
1746
|
+
name="my_role",
|
1706
1747
|
ttl="3600",
|
1707
1748
|
allow_ip_sans=True,
|
1708
1749
|
key_type="rsa",
|
@@ -1719,7 +1760,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1719
1760
|
PKI secret backend roles can be imported using the `path`, e.g.
|
1720
1761
|
|
1721
1762
|
```sh
|
1722
|
-
|
1763
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
1723
1764
|
```
|
1724
1765
|
|
1725
1766
|
:param str resource_name: The name of the resource.
|
@@ -1754,6 +1795,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1754
1795
|
backend: Optional[pulumi.Input[str]] = None,
|
1755
1796
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1756
1797
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1798
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1757
1799
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1758
1800
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1759
1801
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1773,7 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1773
1815
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1774
1816
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1775
1817
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1776
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1818
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1777
1819
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1778
1820
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1779
1821
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1811,6 +1853,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1811
1853
|
__props__.__dict__["backend"] = backend
|
1812
1854
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
1813
1855
|
__props__.__dict__["client_flag"] = client_flag
|
1856
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
1814
1857
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
1815
1858
|
__props__.__dict__["countries"] = countries
|
1816
1859
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -1867,6 +1910,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1867
1910
|
backend: Optional[pulumi.Input[str]] = None,
|
1868
1911
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1869
1912
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1913
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1870
1914
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1871
1915
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1872
1916
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1886,7 +1930,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1886
1930
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1887
1931
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1888
1932
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1889
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1933
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1890
1934
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1891
1935
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1892
1936
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1920,6 +1964,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1920
1964
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1921
1965
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1922
1966
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1967
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1923
1968
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1924
1969
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1925
1970
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -1942,13 +1987,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1942
1987
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1943
1988
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1944
1989
|
The value should not contain leading or trailing forward slashes.
|
1945
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1990
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1946
1991
|
*Available only for Vault Enterprise*.
|
1947
1992
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1948
1993
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1949
1994
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1950
1995
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1951
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1996
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1952
1997
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1953
1998
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1954
1999
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1980,6 +2025,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1980
2025
|
__props__.__dict__["backend"] = backend
|
1981
2026
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
1982
2027
|
__props__.__dict__["client_flag"] = client_flag
|
2028
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
1983
2029
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
1984
2030
|
__props__.__dict__["countries"] = countries
|
1985
2031
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -2147,6 +2193,14 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2147
2193
|
"""
|
2148
2194
|
return pulumi.get(self, "client_flag")
|
2149
2195
|
|
2196
|
+
@property
|
2197
|
+
@pulumi.getter(name="cnValidations")
|
2198
|
+
def cn_validations(self) -> pulumi.Output[Sequence[str]]:
|
2199
|
+
"""
|
2200
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
2201
|
+
"""
|
2202
|
+
return pulumi.get(self, "cn_validations")
|
2203
|
+
|
2150
2204
|
@property
|
2151
2205
|
@pulumi.getter(name="codeSigningFlag")
|
2152
2206
|
def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
|
@@ -2271,7 +2325,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2271
2325
|
"""
|
2272
2326
|
The namespace to provision the resource in.
|
2273
2327
|
The value should not contain leading or trailing forward slashes.
|
2274
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
2328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
2275
2329
|
*Available only for Vault Enterprise*.
|
2276
2330
|
"""
|
2277
2331
|
return pulumi.get(self, "namespace")
|