pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -103,7 +108,7 @@ class SecretBackendRoleArgs:
|
|
103
108
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
104
109
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
110
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
111
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
112
|
*Available only for Vault Enterprise*.
|
108
113
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
109
114
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -596,7 +601,7 @@ class SecretBackendRoleArgs:
|
|
596
601
|
"""
|
597
602
|
The namespace to provision the resource in.
|
598
603
|
The value should not contain leading or trailing forward slashes.
|
599
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
604
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
600
605
|
*Available only for Vault Enterprise*.
|
601
606
|
"""
|
602
607
|
return pulumi.get(self, "namespace")
|
@@ -864,7 +869,7 @@ class _SecretBackendRoleState:
|
|
864
869
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
865
870
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
866
871
|
The value should not contain leading or trailing forward slashes.
|
867
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
872
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
868
873
|
*Available only for Vault Enterprise*.
|
869
874
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
870
875
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -1358,7 +1363,7 @@ class _SecretBackendRoleState:
|
|
1358
1363
|
"""
|
1359
1364
|
The namespace to provision the resource in.
|
1360
1365
|
The value should not contain leading or trailing forward slashes.
|
1361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1366
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1362
1367
|
*Available only for Vault Enterprise*.
|
1363
1368
|
"""
|
1364
1369
|
return pulumi.get(self, "namespace")
|
@@ -1577,7 +1582,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1577
1582
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1578
1583
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1579
1584
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1580
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1585
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1581
1586
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1582
1587
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1583
1588
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1604,6 +1609,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1604
1609
|
max_lease_ttl_seconds=86400)
|
1605
1610
|
role = vault.pki_secret.SecretBackendRole("role",
|
1606
1611
|
backend=pki.path,
|
1612
|
+
name="my_role",
|
1607
1613
|
ttl="3600",
|
1608
1614
|
allow_ip_sans=True,
|
1609
1615
|
key_type="rsa",
|
@@ -1620,7 +1626,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1620
1626
|
PKI secret backend roles can be imported using the `path`, e.g.
|
1621
1627
|
|
1622
1628
|
```sh
|
1623
|
-
|
1629
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
1624
1630
|
```
|
1625
1631
|
|
1626
1632
|
:param str resource_name: The name of the resource.
|
@@ -1664,13 +1670,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1664
1670
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1665
1671
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1666
1672
|
The value should not contain leading or trailing forward slashes.
|
1667
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1673
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1668
1674
|
*Available only for Vault Enterprise*.
|
1669
1675
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1670
1676
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1671
1677
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1672
1678
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1673
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1679
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1674
1680
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1675
1681
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1676
1682
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1703,6 +1709,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1703
1709
|
max_lease_ttl_seconds=86400)
|
1704
1710
|
role = vault.pki_secret.SecretBackendRole("role",
|
1705
1711
|
backend=pki.path,
|
1712
|
+
name="my_role",
|
1706
1713
|
ttl="3600",
|
1707
1714
|
allow_ip_sans=True,
|
1708
1715
|
key_type="rsa",
|
@@ -1719,7 +1726,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1719
1726
|
PKI secret backend roles can be imported using the `path`, e.g.
|
1720
1727
|
|
1721
1728
|
```sh
|
1722
|
-
|
1729
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
1723
1730
|
```
|
1724
1731
|
|
1725
1732
|
:param str resource_name: The name of the resource.
|
@@ -1773,7 +1780,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1773
1780
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1774
1781
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1775
1782
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1776
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1783
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1777
1784
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1778
1785
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1779
1786
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1886,7 +1893,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1886
1893
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1887
1894
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1888
1895
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1889
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1896
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1890
1897
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1891
1898
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1892
1899
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1942,13 +1949,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1942
1949
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1943
1950
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1944
1951
|
The value should not contain leading or trailing forward slashes.
|
1945
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1952
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1946
1953
|
*Available only for Vault Enterprise*.
|
1947
1954
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1948
1955
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1949
1956
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1950
1957
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1951
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1958
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1952
1959
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1953
1960
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1954
1961
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -2271,7 +2278,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2271
2278
|
"""
|
2272
2279
|
The namespace to provision the resource in.
|
2273
2280
|
The value should not contain leading or trailing forward slashes.
|
2274
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
2281
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
2275
2282
|
*Available only for Vault Enterprise*.
|
2276
2283
|
"""
|
2277
2284
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
|
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
|
|
69
74
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
70
75
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
:param pulumi.Input[str] organization: The organization
|
75
80
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
|
|
352
357
|
"""
|
353
358
|
The namespace to provision the resource in.
|
354
359
|
The value should not contain leading or trailing forward slashes.
|
355
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
360
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
356
361
|
*Available only for Vault Enterprise*.
|
357
362
|
"""
|
358
363
|
return pulumi.get(self, "namespace")
|
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
|
|
513
518
|
postal_code: Optional[pulumi.Input[str]] = None,
|
514
519
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
515
520
|
province: Optional[pulumi.Input[str]] = None,
|
516
|
-
serial: Optional[pulumi.Input[str]] = None,
|
517
521
|
serial_number: Optional[pulumi.Input[str]] = None,
|
518
522
|
street_address: Optional[pulumi.Input[str]] = None,
|
519
523
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
|
|
548
552
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
549
553
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
550
554
|
The value should not contain leading or trailing forward slashes.
|
551
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
555
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
552
556
|
*Available only for Vault Enterprise*.
|
553
557
|
:param pulumi.Input[str] organization: The organization
|
554
558
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
|
|
557
561
|
:param pulumi.Input[str] postal_code: The postal code
|
558
562
|
:param pulumi.Input[str] private_key_format: The private key format
|
559
563
|
:param pulumi.Input[str] province: The province
|
560
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
561
564
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
562
565
|
:param pulumi.Input[str] street_address: The street address
|
563
566
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
|
|
621
624
|
pulumi.set(__self__, "private_key_format", private_key_format)
|
622
625
|
if province is not None:
|
623
626
|
pulumi.set(__self__, "province", province)
|
624
|
-
if serial is not None:
|
625
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
626
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
627
|
-
if serial is not None:
|
628
|
-
pulumi.set(__self__, "serial", serial)
|
629
627
|
if serial_number is not None:
|
630
628
|
pulumi.set(__self__, "serial_number", serial_number)
|
631
629
|
if street_address is not None:
|
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
|
|
888
886
|
"""
|
889
887
|
The namespace to provision the resource in.
|
890
888
|
The value should not contain leading or trailing forward slashes.
|
891
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
889
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
892
890
|
*Available only for Vault Enterprise*.
|
893
891
|
"""
|
894
892
|
return pulumi.get(self, "namespace")
|
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
|
|
981
979
|
def province(self, value: Optional[pulumi.Input[str]]):
|
982
980
|
pulumi.set(self, "province", value)
|
983
981
|
|
984
|
-
@property
|
985
|
-
@pulumi.getter
|
986
|
-
def serial(self) -> Optional[pulumi.Input[str]]:
|
987
|
-
"""
|
988
|
-
Deprecated, use `serial_number` instead.
|
989
|
-
"""
|
990
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
991
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
992
|
-
|
993
|
-
return pulumi.get(self, "serial")
|
994
|
-
|
995
|
-
@serial.setter
|
996
|
-
def serial(self, value: Optional[pulumi.Input[str]]):
|
997
|
-
pulumi.set(self, "serial", value)
|
998
|
-
|
999
982
|
@property
|
1000
983
|
@pulumi.getter(name="serialNumber")
|
1001
984
|
def serial_number(self) -> Optional[pulumi.Input[str]]:
|
@@ -1100,7 +1083,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1100
1083
|
import pulumi_vault as vault
|
1101
1084
|
|
1102
1085
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1103
|
-
backend=
|
1086
|
+
backend=pki["path"],
|
1104
1087
|
type="internal",
|
1105
1088
|
common_name="Root CA",
|
1106
1089
|
ttl="315360000",
|
@@ -1111,7 +1094,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1111
1094
|
exclude_cn_from_sans=True,
|
1112
1095
|
ou="My OU",
|
1113
1096
|
organization="My organization",
|
1114
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1097
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1115
1098
|
```
|
1116
1099
|
|
1117
1100
|
:param str resource_name: The name of the resource.
|
@@ -1139,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1139
1122
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1140
1123
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1141
1124
|
The value should not contain leading or trailing forward slashes.
|
1142
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1125
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1143
1126
|
*Available only for Vault Enterprise*.
|
1144
1127
|
:param pulumi.Input[str] organization: The organization
|
1145
1128
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1168,7 +1151,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1168
1151
|
import pulumi_vault as vault
|
1169
1152
|
|
1170
1153
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1171
|
-
backend=
|
1154
|
+
backend=pki["path"],
|
1172
1155
|
type="internal",
|
1173
1156
|
common_name="Root CA",
|
1174
1157
|
ttl="315360000",
|
@@ -1179,7 +1162,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1179
1162
|
exclude_cn_from_sans=True,
|
1180
1163
|
ou="My OU",
|
1181
1164
|
organization="My organization",
|
1182
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1165
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1183
1166
|
```
|
1184
1167
|
|
1185
1168
|
:param str resource_name: The name of the resource.
|
@@ -1272,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1272
1255
|
__props__.__dict__["issuer_id"] = None
|
1273
1256
|
__props__.__dict__["issuing_ca"] = None
|
1274
1257
|
__props__.__dict__["key_id"] = None
|
1275
|
-
__props__.__dict__["serial"] = None
|
1276
1258
|
__props__.__dict__["serial_number"] = None
|
1277
1259
|
super(SecretBackendRootCert, __self__).__init__(
|
1278
1260
|
'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
|
@@ -1312,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1312
1294
|
postal_code: Optional[pulumi.Input[str]] = None,
|
1313
1295
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
1314
1296
|
province: Optional[pulumi.Input[str]] = None,
|
1315
|
-
serial: Optional[pulumi.Input[str]] = None,
|
1316
1297
|
serial_number: Optional[pulumi.Input[str]] = None,
|
1317
1298
|
street_address: Optional[pulumi.Input[str]] = None,
|
1318
1299
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -1352,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1352
1333
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1353
1334
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1354
1335
|
The value should not contain leading or trailing forward slashes.
|
1355
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1336
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1356
1337
|
*Available only for Vault Enterprise*.
|
1357
1338
|
:param pulumi.Input[str] organization: The organization
|
1358
1339
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1361,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1361
1342
|
:param pulumi.Input[str] postal_code: The postal code
|
1362
1343
|
:param pulumi.Input[str] private_key_format: The private key format
|
1363
1344
|
:param pulumi.Input[str] province: The province
|
1364
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
1365
1345
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
1366
1346
|
:param pulumi.Input[str] street_address: The street address
|
1367
1347
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -1401,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1401
1381
|
__props__.__dict__["postal_code"] = postal_code
|
1402
1382
|
__props__.__dict__["private_key_format"] = private_key_format
|
1403
1383
|
__props__.__dict__["province"] = province
|
1404
|
-
__props__.__dict__["serial"] = serial
|
1405
1384
|
__props__.__dict__["serial_number"] = serial_number
|
1406
1385
|
__props__.__dict__["street_address"] = street_address
|
1407
1386
|
__props__.__dict__["ttl"] = ttl
|
@@ -1580,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1580
1559
|
"""
|
1581
1560
|
The namespace to provision the resource in.
|
1582
1561
|
The value should not contain leading or trailing forward slashes.
|
1583
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1584
1563
|
*Available only for Vault Enterprise*.
|
1585
1564
|
"""
|
1586
1565
|
return pulumi.get(self, "namespace")
|
@@ -1641,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1641
1620
|
"""
|
1642
1621
|
return pulumi.get(self, "province")
|
1643
1622
|
|
1644
|
-
@property
|
1645
|
-
@pulumi.getter
|
1646
|
-
def serial(self) -> pulumi.Output[str]:
|
1647
|
-
"""
|
1648
|
-
Deprecated, use `serial_number` instead.
|
1649
|
-
"""
|
1650
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
1651
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
1652
|
-
|
1653
|
-
return pulumi.get(self, "serial")
|
1654
|
-
|
1655
1623
|
@property
|
1656
1624
|
@pulumi.getter(name="serialNumber")
|
1657
1625
|
def serial_number(self) -> pulumi.Output[str]:
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootSignIntermediateArgs', 'SecretBackendRootSignIntermediate']
|
@@ -55,7 +60,7 @@ class SecretBackendRootSignIntermediateArgs:
|
|
55
60
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
56
61
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
57
62
|
The value should not contain leading or trailing forward slashes.
|
58
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
63
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
59
64
|
*Available only for Vault Enterprise*.
|
60
65
|
:param pulumi.Input[str] organization: The organization
|
61
66
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -254,7 +259,7 @@ class SecretBackendRootSignIntermediateArgs:
|
|
254
259
|
"""
|
255
260
|
The namespace to provision the resource in.
|
256
261
|
The value should not contain leading or trailing forward slashes.
|
257
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
262
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
258
263
|
*Available only for Vault Enterprise*.
|
259
264
|
"""
|
260
265
|
return pulumi.get(self, "namespace")
|
@@ -422,7 +427,6 @@ class _SecretBackendRootSignIntermediateState:
|
|
422
427
|
postal_code: Optional[pulumi.Input[str]] = None,
|
423
428
|
province: Optional[pulumi.Input[str]] = None,
|
424
429
|
revoke: Optional[pulumi.Input[bool]] = None,
|
425
|
-
serial: Optional[pulumi.Input[str]] = None,
|
426
430
|
serial_number: Optional[pulumi.Input[str]] = None,
|
427
431
|
street_address: Optional[pulumi.Input[str]] = None,
|
428
432
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -451,7 +455,7 @@ class _SecretBackendRootSignIntermediateState:
|
|
451
455
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
452
456
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
453
457
|
The value should not contain leading or trailing forward slashes.
|
454
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
458
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
455
459
|
*Available only for Vault Enterprise*.
|
456
460
|
:param pulumi.Input[str] organization: The organization
|
457
461
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -460,7 +464,6 @@ class _SecretBackendRootSignIntermediateState:
|
|
460
464
|
:param pulumi.Input[str] postal_code: The postal code
|
461
465
|
:param pulumi.Input[str] province: The province
|
462
466
|
:param pulumi.Input[bool] revoke: If set to `true`, the certificate will be revoked on resource destruction.
|
463
|
-
:param pulumi.Input[str] serial: The serial number.
|
464
467
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
465
468
|
:param pulumi.Input[str] street_address: The street address
|
466
469
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -513,11 +516,6 @@ class _SecretBackendRootSignIntermediateState:
|
|
513
516
|
pulumi.set(__self__, "province", province)
|
514
517
|
if revoke is not None:
|
515
518
|
pulumi.set(__self__, "revoke", revoke)
|
516
|
-
if serial is not None:
|
517
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
518
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
519
|
-
if serial is not None:
|
520
|
-
pulumi.set(__self__, "serial", serial)
|
521
519
|
if serial_number is not None:
|
522
520
|
pulumi.set(__self__, "serial_number", serial_number)
|
523
521
|
if street_address is not None:
|
@@ -719,7 +717,7 @@ class _SecretBackendRootSignIntermediateState:
|
|
719
717
|
"""
|
720
718
|
The namespace to provision the resource in.
|
721
719
|
The value should not contain leading or trailing forward slashes.
|
722
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
720
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
723
721
|
*Available only for Vault Enterprise*.
|
724
722
|
"""
|
725
723
|
return pulumi.get(self, "namespace")
|
@@ -812,21 +810,6 @@ class _SecretBackendRootSignIntermediateState:
|
|
812
810
|
def revoke(self, value: Optional[pulumi.Input[bool]]):
|
813
811
|
pulumi.set(self, "revoke", value)
|
814
812
|
|
815
|
-
@property
|
816
|
-
@pulumi.getter
|
817
|
-
def serial(self) -> Optional[pulumi.Input[str]]:
|
818
|
-
"""
|
819
|
-
The serial number.
|
820
|
-
"""
|
821
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
822
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
823
|
-
|
824
|
-
return pulumi.get(self, "serial")
|
825
|
-
|
826
|
-
@serial.setter
|
827
|
-
def serial(self, value: Optional[pulumi.Input[str]]):
|
828
|
-
pulumi.set(self, "serial", value)
|
829
|
-
|
830
813
|
@property
|
831
814
|
@pulumi.getter(name="serialNumber")
|
832
815
|
def serial_number(self) -> Optional[pulumi.Input[str]]:
|
@@ -927,17 +910,14 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
927
910
|
import pulumi_vault as vault
|
928
911
|
|
929
912
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
930
|
-
backend=
|
931
|
-
csr=
|
913
|
+
backend=root_vault_mount["path"],
|
914
|
+
csr=intermediate["csr"],
|
932
915
|
common_name="Intermediate CA",
|
933
916
|
exclude_cn_from_sans=True,
|
934
917
|
ou="My OU",
|
935
918
|
organization="My organization",
|
936
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
919
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate]))
|
937
920
|
```
|
938
|
-
## Deprecations
|
939
|
-
|
940
|
-
* `serial` - Use `serial_number` instead.
|
941
921
|
|
942
922
|
:param str resource_name: The name of the resource.
|
943
923
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -957,7 +937,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
957
937
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
958
938
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
959
939
|
The value should not contain leading or trailing forward slashes.
|
960
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
940
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
961
941
|
*Available only for Vault Enterprise*.
|
962
942
|
:param pulumi.Input[str] organization: The organization
|
963
943
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -987,17 +967,14 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
987
967
|
import pulumi_vault as vault
|
988
968
|
|
989
969
|
root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
|
990
|
-
backend=
|
991
|
-
csr=
|
970
|
+
backend=root_vault_mount["path"],
|
971
|
+
csr=intermediate["csr"],
|
992
972
|
common_name="Intermediate CA",
|
993
973
|
exclude_cn_from_sans=True,
|
994
974
|
ou="My OU",
|
995
975
|
organization="My organization",
|
996
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
976
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate]))
|
997
977
|
```
|
998
|
-
## Deprecations
|
999
|
-
|
1000
|
-
* `serial` - Use `serial_number` instead.
|
1001
978
|
|
1002
979
|
:param str resource_name: The name of the resource.
|
1003
980
|
:param SecretBackendRootSignIntermediateArgs args: The arguments to use to populate this resource's properties.
|
@@ -1079,7 +1056,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1079
1056
|
__props__.__dict__["certificate"] = None
|
1080
1057
|
__props__.__dict__["certificate_bundle"] = None
|
1081
1058
|
__props__.__dict__["issuing_ca"] = None
|
1082
|
-
__props__.__dict__["serial"] = None
|
1083
1059
|
__props__.__dict__["serial_number"] = None
|
1084
1060
|
super(SecretBackendRootSignIntermediate, __self__).__init__(
|
1085
1061
|
'vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate',
|
@@ -1114,7 +1090,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1114
1090
|
postal_code: Optional[pulumi.Input[str]] = None,
|
1115
1091
|
province: Optional[pulumi.Input[str]] = None,
|
1116
1092
|
revoke: Optional[pulumi.Input[bool]] = None,
|
1117
|
-
serial: Optional[pulumi.Input[str]] = None,
|
1118
1093
|
serial_number: Optional[pulumi.Input[str]] = None,
|
1119
1094
|
street_address: Optional[pulumi.Input[str]] = None,
|
1120
1095
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -1148,7 +1123,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1148
1123
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1149
1124
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1150
1125
|
The value should not contain leading or trailing forward slashes.
|
1151
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1126
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1152
1127
|
*Available only for Vault Enterprise*.
|
1153
1128
|
:param pulumi.Input[str] organization: The organization
|
1154
1129
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1157,7 +1132,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1157
1132
|
:param pulumi.Input[str] postal_code: The postal code
|
1158
1133
|
:param pulumi.Input[str] province: The province
|
1159
1134
|
:param pulumi.Input[bool] revoke: If set to `true`, the certificate will be revoked on resource destruction.
|
1160
|
-
:param pulumi.Input[str] serial: The serial number.
|
1161
1135
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
1162
1136
|
:param pulumi.Input[str] street_address: The street address
|
1163
1137
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -1191,7 +1165,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1191
1165
|
__props__.__dict__["postal_code"] = postal_code
|
1192
1166
|
__props__.__dict__["province"] = province
|
1193
1167
|
__props__.__dict__["revoke"] = revoke
|
1194
|
-
__props__.__dict__["serial"] = serial
|
1195
1168
|
__props__.__dict__["serial_number"] = serial_number
|
1196
1169
|
__props__.__dict__["street_address"] = street_address
|
1197
1170
|
__props__.__dict__["ttl"] = ttl
|
@@ -1329,7 +1302,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1329
1302
|
"""
|
1330
1303
|
The namespace to provision the resource in.
|
1331
1304
|
The value should not contain leading or trailing forward slashes.
|
1332
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1305
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1333
1306
|
*Available only for Vault Enterprise*.
|
1334
1307
|
"""
|
1335
1308
|
return pulumi.get(self, "namespace")
|
@@ -1390,17 +1363,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
|
|
1390
1363
|
"""
|
1391
1364
|
return pulumi.get(self, "revoke")
|
1392
1365
|
|
1393
|
-
@property
|
1394
|
-
@pulumi.getter
|
1395
|
-
def serial(self) -> pulumi.Output[str]:
|
1396
|
-
"""
|
1397
|
-
The serial number.
|
1398
|
-
"""
|
1399
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
1400
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
1401
|
-
|
1402
|
-
return pulumi.get(self, "serial")
|
1403
|
-
|
1404
1366
|
@property
|
1405
1367
|
@pulumi.getter(name="serialNumber")
|
1406
1368
|
def serial_number(self) -> pulumi.Output[str]:
|