pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
|
|
45
50
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
46
51
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
47
52
|
The value should not contain leading or trailing forward slashes.
|
48
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
53
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
54
|
*Available only for Vault Enterprise*.
|
50
55
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
51
56
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
|
|
213
218
|
"""
|
214
219
|
The namespace to provision the resource in.
|
215
220
|
The value should not contain leading or trailing forward slashes.
|
216
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
221
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
217
222
|
*Available only for Vault Enterprise*.
|
218
223
|
"""
|
219
224
|
return pulumi.get(self, "namespace")
|
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
|
|
341
346
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
342
347
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
348
|
The value should not contain leading or trailing forward slashes.
|
344
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
349
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
350
|
*Available only for Vault Enterprise*.
|
346
351
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
347
352
|
:param pulumi.Input[str] private_key: The private key
|
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
|
|
579
584
|
"""
|
580
585
|
The namespace to provision the resource in.
|
581
586
|
The value should not contain leading or trailing forward slashes.
|
582
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
583
588
|
*Available only for Vault Enterprise*.
|
584
589
|
"""
|
585
590
|
return pulumi.get(self, "namespace")
|
@@ -740,9 +745,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
740
745
|
import pulumi_vault as vault
|
741
746
|
|
742
747
|
app = vault.pki_secret.SecretBackendCert("app",
|
743
|
-
backend=
|
748
|
+
backend=intermediate["path"],
|
749
|
+
name=test["name"],
|
744
750
|
common_name="app.my.domain",
|
745
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
751
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
746
752
|
```
|
747
753
|
|
748
754
|
:param str resource_name: The name of the resource.
|
@@ -759,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
759
765
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
760
766
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
761
767
|
The value should not contain leading or trailing forward slashes.
|
762
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
768
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
763
769
|
*Available only for Vault Enterprise*.
|
764
770
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
765
771
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -782,9 +788,10 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
782
788
|
import pulumi_vault as vault
|
783
789
|
|
784
790
|
app = vault.pki_secret.SecretBackendCert("app",
|
785
|
-
backend=
|
791
|
+
backend=intermediate["path"],
|
792
|
+
name=test["name"],
|
786
793
|
common_name="app.my.domain",
|
787
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
794
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
788
795
|
```
|
789
796
|
|
790
797
|
:param str resource_name: The name of the resource.
|
@@ -917,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
917
924
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
918
925
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
919
926
|
The value should not contain leading or trailing forward slashes.
|
920
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
927
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
921
928
|
*Available only for Vault Enterprise*.
|
922
929
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
923
930
|
:param pulumi.Input[str] private_key: The private key
|
@@ -1079,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
1079
1086
|
"""
|
1080
1087
|
The namespace to provision the resource in.
|
1081
1088
|
The value should not contain leading or trailing forward slashes.
|
1082
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1089
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1083
1090
|
*Available only for Vault Enterprise*.
|
1084
1091
|
"""
|
1085
1092
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
|
|
23
28
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
|
|
82
87
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -150,7 +155,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
150
155
|
import pulumi_vault as vault
|
151
156
|
|
152
157
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
153
|
-
backend=
|
158
|
+
backend=intermediate_vault_mount["path"],
|
154
159
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
155
160
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
156
161
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -200,7 +205,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
200
205
|
MUR4qFxeUOW/GJGccMUd
|
201
206
|
-----END CERTIFICATE-----
|
202
207
|
\"\"\",
|
203
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
208
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
204
209
|
```
|
205
210
|
|
206
211
|
:param str resource_name: The name of the resource.
|
@@ -208,7 +213,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
208
213
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
209
214
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
210
215
|
The value should not contain leading or trailing forward slashes.
|
211
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
212
217
|
*Available only for Vault Enterprise*.
|
213
218
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
214
219
|
"""
|
@@ -226,7 +231,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
226
231
|
import pulumi_vault as vault
|
227
232
|
|
228
233
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
229
|
-
backend=
|
234
|
+
backend=intermediate_vault_mount["path"],
|
230
235
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
231
236
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
232
237
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -276,7 +281,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
276
281
|
MUR4qFxeUOW/GJGccMUd
|
277
282
|
-----END CERTIFICATE-----
|
278
283
|
\"\"\",
|
279
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
284
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
280
285
|
```
|
281
286
|
|
282
287
|
:param str resource_name: The name of the resource.
|
@@ -338,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
338
343
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
339
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
340
345
|
The value should not contain leading or trailing forward slashes.
|
341
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
346
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
342
347
|
*Available only for Vault Enterprise*.
|
343
348
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
344
349
|
"""
|
@@ -365,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
365
370
|
"""
|
366
371
|
The namespace to provision the resource in.
|
367
372
|
The value should not contain leading or trailing forward slashes.
|
368
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
369
374
|
*Available only for Vault Enterprise*.
|
370
375
|
"""
|
371
376
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
|
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
|
|
27
32
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
28
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
34
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
36
|
*Available only for Vault Enterprise*.
|
32
37
|
"""
|
33
38
|
pulumi.set(__self__, "backend", backend)
|
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
|
|
82
87
|
"""
|
83
88
|
The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
"""
|
88
93
|
return pulumi.get(self, "namespace")
|
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
|
|
108
113
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
109
114
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
110
115
|
The value should not contain leading or trailing forward slashes.
|
111
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
116
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
112
117
|
*Available only for Vault Enterprise*.
|
113
118
|
"""
|
114
119
|
if backend is not None:
|
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
|
|
164
169
|
"""
|
165
170
|
The namespace to provision the resource in.
|
166
171
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
172
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
173
|
*Available only for Vault Enterprise*.
|
169
174
|
"""
|
170
175
|
return pulumi.get(self, "namespace")
|
@@ -216,7 +221,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
216
221
|
PKI secret backend config issuers can be imported using the path, e.g.
|
217
222
|
|
218
223
|
```sh
|
219
|
-
|
224
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
|
220
225
|
```
|
221
226
|
|
222
227
|
:param str resource_name: The name of the resource.
|
@@ -228,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
228
233
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
229
234
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
230
235
|
The value should not contain leading or trailing forward slashes.
|
231
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
236
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
232
237
|
*Available only for Vault Enterprise*.
|
233
238
|
"""
|
234
239
|
...
|
@@ -269,7 +274,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
269
274
|
PKI secret backend config issuers can be imported using the path, e.g.
|
270
275
|
|
271
276
|
```sh
|
272
|
-
|
277
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
|
273
278
|
```
|
274
279
|
|
275
280
|
:param str resource_name: The name of the resource.
|
@@ -334,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
334
339
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
335
340
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
336
341
|
The value should not contain leading or trailing forward slashes.
|
337
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
342
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
338
343
|
*Available only for Vault Enterprise*.
|
339
344
|
"""
|
340
345
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -379,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
379
384
|
"""
|
380
385
|
The namespace to provision the resource in.
|
381
386
|
The value should not contain leading or trailing forward slashes.
|
382
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
387
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
383
388
|
*Available only for Vault Enterprise*.
|
384
389
|
"""
|
385
390
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
19
25
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
21
27
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
|
|
23
29
|
The set of arguments for constructing a SecretBackendConfigUrls resource.
|
24
30
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
25
31
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
32
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
26
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
27
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
35
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
37
|
*Available only for Vault Enterprise*.
|
31
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
32
39
|
"""
|
33
40
|
pulumi.set(__self__, "backend", backend)
|
34
41
|
if crl_distribution_points is not None:
|
35
42
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
43
|
+
if enable_templating is not None:
|
44
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
36
45
|
if issuing_certificates is not None:
|
37
46
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
38
47
|
if namespace is not None:
|
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
|
|
64
73
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
65
74
|
pulumi.set(self, "crl_distribution_points", value)
|
66
75
|
|
76
|
+
@property
|
77
|
+
@pulumi.getter(name="enableTemplating")
|
78
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
79
|
+
"""
|
80
|
+
Specifies that templating of AIA fields is allowed.
|
81
|
+
"""
|
82
|
+
return pulumi.get(self, "enable_templating")
|
83
|
+
|
84
|
+
@enable_templating.setter
|
85
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
86
|
+
pulumi.set(self, "enable_templating", value)
|
87
|
+
|
67
88
|
@property
|
68
89
|
@pulumi.getter(name="issuingCertificates")
|
69
90
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
|
|
82
103
|
"""
|
83
104
|
The namespace to provision the resource in.
|
84
105
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
106
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
107
|
*Available only for Vault Enterprise*.
|
87
108
|
"""
|
88
109
|
return pulumi.get(self, "namespace")
|
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
|
|
109
130
|
def __init__(__self__, *,
|
110
131
|
backend: Optional[pulumi.Input[str]] = None,
|
111
132
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
133
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
112
134
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
113
135
|
namespace: Optional[pulumi.Input[str]] = None,
|
114
136
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
|
|
116
138
|
Input properties used for looking up and filtering SecretBackendConfigUrls resources.
|
117
139
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
118
140
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
141
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
119
142
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
120
143
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
144
|
The value should not contain leading or trailing forward slashes.
|
122
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
123
146
|
*Available only for Vault Enterprise*.
|
124
147
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
125
148
|
"""
|
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
|
|
127
150
|
pulumi.set(__self__, "backend", backend)
|
128
151
|
if crl_distribution_points is not None:
|
129
152
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
153
|
+
if enable_templating is not None:
|
154
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
130
155
|
if issuing_certificates is not None:
|
131
156
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
132
157
|
if namespace is not None:
|
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
|
|
158
183
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
159
184
|
pulumi.set(self, "crl_distribution_points", value)
|
160
185
|
|
186
|
+
@property
|
187
|
+
@pulumi.getter(name="enableTemplating")
|
188
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
189
|
+
"""
|
190
|
+
Specifies that templating of AIA fields is allowed.
|
191
|
+
"""
|
192
|
+
return pulumi.get(self, "enable_templating")
|
193
|
+
|
194
|
+
@enable_templating.setter
|
195
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
196
|
+
pulumi.set(self, "enable_templating", value)
|
197
|
+
|
161
198
|
@property
|
162
199
|
@pulumi.getter(name="issuingCertificates")
|
163
200
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
|
|
176
213
|
"""
|
177
214
|
The namespace to provision the resource in.
|
178
215
|
The value should not contain leading or trailing forward slashes.
|
179
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
217
|
*Available only for Vault Enterprise*.
|
181
218
|
"""
|
182
219
|
return pulumi.get(self, "namespace")
|
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
205
242
|
opts: Optional[pulumi.ResourceOptions] = None,
|
206
243
|
backend: Optional[pulumi.Input[str]] = None,
|
207
244
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
245
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
208
246
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
209
247
|
namespace: Optional[pulumi.Input[str]] = None,
|
210
248
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -231,20 +269,23 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
231
269
|
|
232
270
|
## Import
|
233
271
|
|
234
|
-
The PKI config URLs can be imported using the resource's `id`.
|
272
|
+
The PKI config URLs can be imported using the resource's `id`.
|
273
|
+
In the case of the example above the `id` would be `pki-root/config/urls`,
|
274
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
235
275
|
|
236
276
|
```sh
|
237
|
-
|
277
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
|
238
278
|
```
|
239
279
|
|
240
280
|
:param str resource_name: The name of the resource.
|
241
281
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
242
282
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
243
283
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
284
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
244
285
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
245
286
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
246
287
|
The value should not contain leading or trailing forward slashes.
|
247
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
288
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
248
289
|
*Available only for Vault Enterprise*.
|
249
290
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
250
291
|
"""
|
@@ -276,10 +317,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
276
317
|
|
277
318
|
## Import
|
278
319
|
|
279
|
-
The PKI config URLs can be imported using the resource's `id`.
|
320
|
+
The PKI config URLs can be imported using the resource's `id`.
|
321
|
+
In the case of the example above the `id` would be `pki-root/config/urls`,
|
322
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
280
323
|
|
281
324
|
```sh
|
282
|
-
|
325
|
+
$ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
|
283
326
|
```
|
284
327
|
|
285
328
|
:param str resource_name: The name of the resource.
|
@@ -299,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
299
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
300
343
|
backend: Optional[pulumi.Input[str]] = None,
|
301
344
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
345
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
302
346
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
303
347
|
namespace: Optional[pulumi.Input[str]] = None,
|
304
348
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -315,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
315
359
|
raise TypeError("Missing required property 'backend'")
|
316
360
|
__props__.__dict__["backend"] = backend
|
317
361
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
362
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
318
363
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
319
364
|
__props__.__dict__["namespace"] = namespace
|
320
365
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -330,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
330
375
|
opts: Optional[pulumi.ResourceOptions] = None,
|
331
376
|
backend: Optional[pulumi.Input[str]] = None,
|
332
377
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
378
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
333
379
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
334
380
|
namespace: Optional[pulumi.Input[str]] = None,
|
335
381
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
|
@@ -342,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
342
388
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
343
389
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
344
390
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
391
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
345
392
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
346
393
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
347
394
|
The value should not contain leading or trailing forward slashes.
|
348
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
395
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
349
396
|
*Available only for Vault Enterprise*.
|
350
397
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
351
398
|
"""
|
@@ -355,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
355
402
|
|
356
403
|
__props__.__dict__["backend"] = backend
|
357
404
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
405
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
358
406
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
359
407
|
__props__.__dict__["namespace"] = namespace
|
360
408
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -376,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
376
424
|
"""
|
377
425
|
return pulumi.get(self, "crl_distribution_points")
|
378
426
|
|
427
|
+
@property
|
428
|
+
@pulumi.getter(name="enableTemplating")
|
429
|
+
def enable_templating(self) -> pulumi.Output[Optional[bool]]:
|
430
|
+
"""
|
431
|
+
Specifies that templating of AIA fields is allowed.
|
432
|
+
"""
|
433
|
+
return pulumi.get(self, "enable_templating")
|
434
|
+
|
379
435
|
@property
|
380
436
|
@pulumi.getter(name="issuingCertificates")
|
381
437
|
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -390,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
390
446
|
"""
|
391
447
|
The namespace to provision the resource in.
|
392
448
|
The value should not contain leading or trailing forward slashes.
|
393
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
449
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
394
450
|
*Available only for Vault Enterprise*.
|
395
451
|
"""
|
396
452
|
return pulumi.get(self, "namespace")
|