pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
45
50
  :param pulumi.Input[str] name: Name of the role to create the certificate against
46
51
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
47
52
  The value should not contain leading or trailing forward slashes.
48
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
53
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
54
  *Available only for Vault Enterprise*.
50
55
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
51
56
  :param pulumi.Input[str] private_key_format: The private key format
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
213
218
  """
214
219
  The namespace to provision the resource in.
215
220
  The value should not contain leading or trailing forward slashes.
216
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
221
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
222
  *Available only for Vault Enterprise*.
218
223
  """
219
224
  return pulumi.get(self, "namespace")
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
341
346
  :param pulumi.Input[str] name: Name of the role to create the certificate against
342
347
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
348
  The value should not contain leading or trailing forward slashes.
344
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
349
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
350
  *Available only for Vault Enterprise*.
346
351
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
347
352
  :param pulumi.Input[str] private_key: The private key
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
579
584
  """
580
585
  The namespace to provision the resource in.
581
586
  The value should not contain leading or trailing forward slashes.
582
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
583
588
  *Available only for Vault Enterprise*.
584
589
  """
585
590
  return pulumi.get(self, "namespace")
@@ -740,9 +745,10 @@ class SecretBackendCert(pulumi.CustomResource):
740
745
  import pulumi_vault as vault
741
746
 
742
747
  app = vault.pki_secret.SecretBackendCert("app",
743
- backend=vault_mount["intermediate"]["path"],
748
+ backend=intermediate["path"],
749
+ name=test["name"],
744
750
  common_name="app.my.domain",
745
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
751
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
746
752
  ```
747
753
 
748
754
  :param str resource_name: The name of the resource.
@@ -759,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
759
765
  :param pulumi.Input[str] name: Name of the role to create the certificate against
760
766
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
761
767
  The value should not contain leading or trailing forward slashes.
762
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
768
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
763
769
  *Available only for Vault Enterprise*.
764
770
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
765
771
  :param pulumi.Input[str] private_key_format: The private key format
@@ -782,9 +788,10 @@ class SecretBackendCert(pulumi.CustomResource):
782
788
  import pulumi_vault as vault
783
789
 
784
790
  app = vault.pki_secret.SecretBackendCert("app",
785
- backend=vault_mount["intermediate"]["path"],
791
+ backend=intermediate["path"],
792
+ name=test["name"],
786
793
  common_name="app.my.domain",
787
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
794
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
788
795
  ```
789
796
 
790
797
  :param str resource_name: The name of the resource.
@@ -917,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
917
924
  :param pulumi.Input[str] name: Name of the role to create the certificate against
918
925
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
919
926
  The value should not contain leading or trailing forward slashes.
920
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
927
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
921
928
  *Available only for Vault Enterprise*.
922
929
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
923
930
  :param pulumi.Input[str] private_key: The private key
@@ -1079,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
1079
1086
  """
1080
1087
  The namespace to provision the resource in.
1081
1088
  The value should not contain leading or trailing forward slashes.
1082
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1089
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1083
1090
  *Available only for Vault Enterprise*.
1084
1091
  """
1085
1092
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
23
28
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "backend", backend)
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
61
66
  """
62
67
  The namespace to provision the resource in.
63
68
  The value should not contain leading or trailing forward slashes.
64
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
69
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
70
  *Available only for Vault Enterprise*.
66
71
  """
67
72
  return pulumi.get(self, "namespace")
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
82
87
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
83
88
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
88
93
  """
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
111
116
  """
112
117
  The namespace to provision the resource in.
113
118
  The value should not contain leading or trailing forward slashes.
114
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
120
  *Available only for Vault Enterprise*.
116
121
  """
117
122
  return pulumi.get(self, "namespace")
@@ -150,7 +155,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
150
155
  import pulumi_vault as vault
151
156
 
152
157
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
153
- backend=vault_mount["intermediate"]["path"],
158
+ backend=intermediate_vault_mount["path"],
154
159
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
155
160
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
156
161
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -200,7 +205,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
200
205
  MUR4qFxeUOW/GJGccMUd
201
206
  -----END CERTIFICATE-----
202
207
  \"\"\",
203
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
208
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
204
209
  ```
205
210
 
206
211
  :param str resource_name: The name of the resource.
@@ -208,7 +213,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
208
213
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
209
214
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
210
215
  The value should not contain leading or trailing forward slashes.
211
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
217
  *Available only for Vault Enterprise*.
213
218
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
214
219
  """
@@ -226,7 +231,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
226
231
  import pulumi_vault as vault
227
232
 
228
233
  intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
229
- backend=vault_mount["intermediate"]["path"],
234
+ backend=intermediate_vault_mount["path"],
230
235
  pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
231
236
  MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
232
237
  5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
@@ -276,7 +281,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
276
281
  MUR4qFxeUOW/GJGccMUd
277
282
  -----END CERTIFICATE-----
278
283
  \"\"\",
279
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["intermediate"]]))
284
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
280
285
  ```
281
286
 
282
287
  :param str resource_name: The name of the resource.
@@ -338,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
338
343
  :param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
339
344
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
340
345
  The value should not contain leading or trailing forward slashes.
341
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
346
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
342
347
  *Available only for Vault Enterprise*.
343
348
  :param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
344
349
  """
@@ -365,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
365
370
  """
366
371
  The namespace to provision the resource in.
367
372
  The value should not contain leading or trailing forward slashes.
368
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
373
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
369
374
  *Available only for Vault Enterprise*.
370
375
  """
371
376
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
27
32
  or an issuer import operation updates the default issuer to the newly added issuer.
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "backend", backend)
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
82
87
  """
83
88
  The namespace to provision the resource in.
84
89
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
90
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
91
  *Available only for Vault Enterprise*.
87
92
  """
88
93
  return pulumi.get(self, "namespace")
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
108
113
  or an issuer import operation updates the default issuer to the newly added issuer.
109
114
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
110
115
  The value should not contain leading or trailing forward slashes.
111
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
116
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
112
117
  *Available only for Vault Enterprise*.
113
118
  """
114
119
  if backend is not None:
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
164
169
  """
165
170
  The namespace to provision the resource in.
166
171
  The value should not contain leading or trailing forward slashes.
167
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
172
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
173
  *Available only for Vault Enterprise*.
169
174
  """
170
175
  return pulumi.get(self, "namespace")
@@ -216,7 +221,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
216
221
  PKI secret backend config issuers can be imported using the path, e.g.
217
222
 
218
223
  ```sh
219
- $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
224
+ $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
220
225
  ```
221
226
 
222
227
  :param str resource_name: The name of the resource.
@@ -228,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
228
233
  or an issuer import operation updates the default issuer to the newly added issuer.
229
234
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
230
235
  The value should not contain leading or trailing forward slashes.
231
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
236
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
232
237
  *Available only for Vault Enterprise*.
233
238
  """
234
239
  ...
@@ -269,7 +274,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
269
274
  PKI secret backend config issuers can be imported using the path, e.g.
270
275
 
271
276
  ```sh
272
- $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
277
+ $ pulumi import vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers config pki/config/issuers
273
278
  ```
274
279
 
275
280
  :param str resource_name: The name of the resource.
@@ -334,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
334
339
  or an issuer import operation updates the default issuer to the newly added issuer.
335
340
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
336
341
  The value should not contain leading or trailing forward slashes.
337
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
342
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
343
  *Available only for Vault Enterprise*.
339
344
  """
340
345
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -379,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
379
384
  """
380
385
  The namespace to provision the resource in.
381
386
  The value should not contain leading or trailing forward slashes.
382
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
387
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
383
388
  *Available only for Vault Enterprise*.
384
389
  """
385
390
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
16
21
  def __init__(__self__, *,
17
22
  backend: pulumi.Input[str],
18
23
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
+ enable_templating: Optional[pulumi.Input[bool]] = None,
19
25
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
26
  namespace: Optional[pulumi.Input[str]] = None,
21
27
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
23
29
  The set of arguments for constructing a SecretBackendConfigUrls resource.
24
30
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
25
31
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
32
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
26
33
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
27
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
35
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
37
  *Available only for Vault Enterprise*.
31
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
32
39
  """
33
40
  pulumi.set(__self__, "backend", backend)
34
41
  if crl_distribution_points is not None:
35
42
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
43
+ if enable_templating is not None:
44
+ pulumi.set(__self__, "enable_templating", enable_templating)
36
45
  if issuing_certificates is not None:
37
46
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
38
47
  if namespace is not None:
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
64
73
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
65
74
  pulumi.set(self, "crl_distribution_points", value)
66
75
 
76
+ @property
77
+ @pulumi.getter(name="enableTemplating")
78
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
79
+ """
80
+ Specifies that templating of AIA fields is allowed.
81
+ """
82
+ return pulumi.get(self, "enable_templating")
83
+
84
+ @enable_templating.setter
85
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
86
+ pulumi.set(self, "enable_templating", value)
87
+
67
88
  @property
68
89
  @pulumi.getter(name="issuingCertificates")
69
90
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
82
103
  """
83
104
  The namespace to provision the resource in.
84
105
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
106
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
107
  *Available only for Vault Enterprise*.
87
108
  """
88
109
  return pulumi.get(self, "namespace")
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
109
130
  def __init__(__self__, *,
110
131
  backend: Optional[pulumi.Input[str]] = None,
111
132
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
133
+ enable_templating: Optional[pulumi.Input[bool]] = None,
112
134
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
113
135
  namespace: Optional[pulumi.Input[str]] = None,
114
136
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
116
138
  Input properties used for looking up and filtering SecretBackendConfigUrls resources.
117
139
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
118
140
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
141
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
119
142
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
120
143
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
144
  The value should not contain leading or trailing forward slashes.
122
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
146
  *Available only for Vault Enterprise*.
124
147
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
125
148
  """
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
127
150
  pulumi.set(__self__, "backend", backend)
128
151
  if crl_distribution_points is not None:
129
152
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
153
+ if enable_templating is not None:
154
+ pulumi.set(__self__, "enable_templating", enable_templating)
130
155
  if issuing_certificates is not None:
131
156
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
132
157
  if namespace is not None:
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
158
183
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
159
184
  pulumi.set(self, "crl_distribution_points", value)
160
185
 
186
+ @property
187
+ @pulumi.getter(name="enableTemplating")
188
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
189
+ """
190
+ Specifies that templating of AIA fields is allowed.
191
+ """
192
+ return pulumi.get(self, "enable_templating")
193
+
194
+ @enable_templating.setter
195
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
196
+ pulumi.set(self, "enable_templating", value)
197
+
161
198
  @property
162
199
  @pulumi.getter(name="issuingCertificates")
163
200
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
176
213
  """
177
214
  The namespace to provision the resource in.
178
215
  The value should not contain leading or trailing forward slashes.
179
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
217
  *Available only for Vault Enterprise*.
181
218
  """
182
219
  return pulumi.get(self, "namespace")
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
205
242
  opts: Optional[pulumi.ResourceOptions] = None,
206
243
  backend: Optional[pulumi.Input[str]] = None,
207
244
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
245
+ enable_templating: Optional[pulumi.Input[bool]] = None,
208
246
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
209
247
  namespace: Optional[pulumi.Input[str]] = None,
210
248
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -231,20 +269,23 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
231
269
 
232
270
  ## Import
233
271
 
234
- The PKI config URLs can be imported using the resource's `id`. In the case of the example above the `id` would be `pki-root/config/urls`, where the `pki-root` component is the resource's `backend`, e.g.
272
+ The PKI config URLs can be imported using the resource's `id`.
273
+ In the case of the example above the `id` would be `pki-root/config/urls`,
274
+ where the `pki-root` component is the resource's `backend`, e.g.
235
275
 
236
276
  ```sh
237
- $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
277
+ $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
238
278
  ```
239
279
 
240
280
  :param str resource_name: The name of the resource.
241
281
  :param pulumi.ResourceOptions opts: Options for the resource.
242
282
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
243
283
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
284
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
244
285
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
245
286
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
246
287
  The value should not contain leading or trailing forward slashes.
247
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
288
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
248
289
  *Available only for Vault Enterprise*.
249
290
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
250
291
  """
@@ -276,10 +317,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
276
317
 
277
318
  ## Import
278
319
 
279
- The PKI config URLs can be imported using the resource's `id`. In the case of the example above the `id` would be `pki-root/config/urls`, where the `pki-root` component is the resource's `backend`, e.g.
320
+ The PKI config URLs can be imported using the resource's `id`.
321
+ In the case of the example above the `id` would be `pki-root/config/urls`,
322
+ where the `pki-root` component is the resource's `backend`, e.g.
280
323
 
281
324
  ```sh
282
- $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
325
+ $ pulumi import vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls example pki-root/config/urls
283
326
  ```
284
327
 
285
328
  :param str resource_name: The name of the resource.
@@ -299,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
299
342
  opts: Optional[pulumi.ResourceOptions] = None,
300
343
  backend: Optional[pulumi.Input[str]] = None,
301
344
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
345
+ enable_templating: Optional[pulumi.Input[bool]] = None,
302
346
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
303
347
  namespace: Optional[pulumi.Input[str]] = None,
304
348
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -315,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
315
359
  raise TypeError("Missing required property 'backend'")
316
360
  __props__.__dict__["backend"] = backend
317
361
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
362
+ __props__.__dict__["enable_templating"] = enable_templating
318
363
  __props__.__dict__["issuing_certificates"] = issuing_certificates
319
364
  __props__.__dict__["namespace"] = namespace
320
365
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -330,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
330
375
  opts: Optional[pulumi.ResourceOptions] = None,
331
376
  backend: Optional[pulumi.Input[str]] = None,
332
377
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
378
+ enable_templating: Optional[pulumi.Input[bool]] = None,
333
379
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
334
380
  namespace: Optional[pulumi.Input[str]] = None,
335
381
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
@@ -342,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
342
388
  :param pulumi.ResourceOptions opts: Options for the resource.
343
389
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
344
390
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
391
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
345
392
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
346
393
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
347
394
  The value should not contain leading or trailing forward slashes.
348
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
395
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
349
396
  *Available only for Vault Enterprise*.
350
397
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
351
398
  """
@@ -355,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
355
402
 
356
403
  __props__.__dict__["backend"] = backend
357
404
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
405
+ __props__.__dict__["enable_templating"] = enable_templating
358
406
  __props__.__dict__["issuing_certificates"] = issuing_certificates
359
407
  __props__.__dict__["namespace"] = namespace
360
408
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -376,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
376
424
  """
377
425
  return pulumi.get(self, "crl_distribution_points")
378
426
 
427
+ @property
428
+ @pulumi.getter(name="enableTemplating")
429
+ def enable_templating(self) -> pulumi.Output[Optional[bool]]:
430
+ """
431
+ Specifies that templating of AIA fields is allowed.
432
+ """
433
+ return pulumi.get(self, "enable_templating")
434
+
379
435
  @property
380
436
  @pulumi.getter(name="issuingCertificates")
381
437
  def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -390,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
390
446
  """
391
447
  The namespace to provision the resource in.
392
448
  The value should not contain leading or trailing forward slashes.
393
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
449
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
394
450
  *Available only for Vault Enterprise*.
395
451
  """
396
452
  return pulumi.get(self, "namespace")