pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +59 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +216 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +66 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +110 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -114,7 +119,6 @@ def get_backend_key(backend: Optional[str] = None,
|
|
114
119
|
"""
|
115
120
|
## Example Usage
|
116
121
|
|
117
|
-
<!--Start PulumiCodeChooser -->
|
118
122
|
```python
|
119
123
|
import pulumi
|
120
124
|
import pulumi_vault as vault
|
@@ -129,10 +133,9 @@ def get_backend_key(backend: Optional[str] = None,
|
|
129
133
|
key_name="example",
|
130
134
|
key_type="rsa",
|
131
135
|
key_bits=4096)
|
132
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
136
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
133
137
|
key_ref=key_id))
|
134
138
|
```
|
135
|
-
<!--End PulumiCodeChooser -->
|
136
139
|
|
137
140
|
|
138
141
|
:param str backend: The path to the PKI secret backend to
|
@@ -140,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
|
|
140
143
|
:param str key_ref: Reference to an existing key.
|
141
144
|
:param str namespace: The namespace of the target resource.
|
142
145
|
The value should not contain leading or trailing forward slashes.
|
143
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
144
147
|
*Available only for Vault Enterprise*.
|
145
148
|
"""
|
146
149
|
__args__ = dict()
|
@@ -158,17 +161,13 @@ def get_backend_key(backend: Optional[str] = None,
|
|
158
161
|
key_ref=pulumi.get(__ret__, 'key_ref'),
|
159
162
|
key_type=pulumi.get(__ret__, 'key_type'),
|
160
163
|
namespace=pulumi.get(__ret__, 'namespace'))
|
161
|
-
|
162
|
-
|
163
|
-
@_utilities.lift_output_func(get_backend_key)
|
164
164
|
def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
165
165
|
key_ref: Optional[pulumi.Input[str]] = None,
|
166
166
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
167
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
|
167
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
168
168
|
"""
|
169
169
|
## Example Usage
|
170
170
|
|
171
|
-
<!--Start PulumiCodeChooser -->
|
172
171
|
```python
|
173
172
|
import pulumi
|
174
173
|
import pulumi_vault as vault
|
@@ -183,10 +182,9 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
183
182
|
key_name="example",
|
184
183
|
key_type="rsa",
|
185
184
|
key_bits=4096)
|
186
|
-
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=
|
185
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
187
186
|
key_ref=key_id))
|
188
187
|
```
|
189
|
-
<!--End PulumiCodeChooser -->
|
190
188
|
|
191
189
|
|
192
190
|
:param str backend: The path to the PKI secret backend to
|
@@ -194,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
|
|
194
192
|
:param str key_ref: Reference to an existing key.
|
195
193
|
:param str namespace: The namespace of the target resource.
|
196
194
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
196
|
*Available only for Vault Enterprise*.
|
199
197
|
"""
|
200
|
-
|
198
|
+
__args__ = dict()
|
199
|
+
__args__['backend'] = backend
|
200
|
+
__args__['keyRef'] = key_ref
|
201
|
+
__args__['namespace'] = namespace
|
202
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
|
|
56
61
|
|
57
62
|
@property
|
58
63
|
@pulumi.getter(name="keyInfo")
|
59
|
-
def key_info(self) -> Mapping[str,
|
64
|
+
def key_info(self) -> Mapping[str, str]:
|
60
65
|
"""
|
61
66
|
Map of key strings read from Vault.
|
62
67
|
"""
|
@@ -104,7 +109,6 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
104
109
|
"""
|
105
110
|
## Example Usage
|
106
111
|
|
107
|
-
<!--Start PulumiCodeChooser -->
|
108
112
|
```python
|
109
113
|
import pulumi
|
110
114
|
import pulumi_vault as vault
|
@@ -121,14 +125,13 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
121
125
|
key_name="example")
|
122
126
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
123
127
|
```
|
124
|
-
<!--End PulumiCodeChooser -->
|
125
128
|
|
126
129
|
|
127
130
|
:param str backend: The path to the PKI secret backend to
|
128
131
|
read the keys from, with no leading or trailing `/`s.
|
129
132
|
:param str namespace: The namespace of the target resource.
|
130
133
|
The value should not contain leading or trailing forward slashes.
|
131
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
132
135
|
*Available only for Vault Enterprise*.
|
133
136
|
"""
|
134
137
|
__args__ = dict()
|
@@ -144,16 +147,12 @@ def get_backend_keys(backend: Optional[str] = None,
|
|
144
147
|
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
145
148
|
keys=pulumi.get(__ret__, 'keys'),
|
146
149
|
namespace=pulumi.get(__ret__, 'namespace'))
|
147
|
-
|
148
|
-
|
149
|
-
@_utilities.lift_output_func(get_backend_keys)
|
150
150
|
def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
151
151
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
153
153
|
"""
|
154
154
|
## Example Usage
|
155
155
|
|
156
|
-
<!--Start PulumiCodeChooser -->
|
157
156
|
```python
|
158
157
|
import pulumi
|
159
158
|
import pulumi_vault as vault
|
@@ -170,14 +169,24 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
|
|
170
169
|
key_name="example")
|
171
170
|
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
172
171
|
```
|
173
|
-
<!--End PulumiCodeChooser -->
|
174
172
|
|
175
173
|
|
176
174
|
:param str backend: The path to the PKI secret backend to
|
177
175
|
read the keys from, with no leading or trailing `/`s.
|
178
176
|
:param str namespace: The namespace of the target resource.
|
179
177
|
The value should not contain leading or trailing forward slashes.
|
180
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
179
|
*Available only for Vault Enterprise*.
|
182
180
|
"""
|
183
|
-
|
181
|
+
__args__ = dict()
|
182
|
+
__args__['backend'] = backend
|
183
|
+
__args__['namespace'] = namespace
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
@@ -4,15 +4,74 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigCmpv2Authenticators',
|
19
|
+
'BackendConfigEstAuthenticators',
|
13
20
|
'SecretBackendRolePolicyIdentifier',
|
21
|
+
'GetBackendConfigCmpv2AuthenticatorResult',
|
22
|
+
'GetBackendConfigEstAuthenticatorResult',
|
14
23
|
]
|
15
24
|
|
25
|
+
@pulumi.output_type
|
26
|
+
class BackendConfigCmpv2Authenticators(dict):
|
27
|
+
def __init__(__self__, *,
|
28
|
+
cert: Optional[Mapping[str, str]] = None):
|
29
|
+
"""
|
30
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
"""
|
32
|
+
if cert is not None:
|
33
|
+
pulumi.set(__self__, "cert", cert)
|
34
|
+
|
35
|
+
@property
|
36
|
+
@pulumi.getter
|
37
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
38
|
+
"""
|
39
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
40
|
+
"""
|
41
|
+
return pulumi.get(self, "cert")
|
42
|
+
|
43
|
+
|
44
|
+
@pulumi.output_type
|
45
|
+
class BackendConfigEstAuthenticators(dict):
|
46
|
+
def __init__(__self__, *,
|
47
|
+
cert: Optional[Mapping[str, str]] = None,
|
48
|
+
userpass: Optional[Mapping[str, str]] = None):
|
49
|
+
"""
|
50
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
51
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
52
|
+
"""
|
53
|
+
if cert is not None:
|
54
|
+
pulumi.set(__self__, "cert", cert)
|
55
|
+
if userpass is not None:
|
56
|
+
pulumi.set(__self__, "userpass", userpass)
|
57
|
+
|
58
|
+
@property
|
59
|
+
@pulumi.getter
|
60
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
61
|
+
"""
|
62
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
63
|
+
"""
|
64
|
+
return pulumi.get(self, "cert")
|
65
|
+
|
66
|
+
@property
|
67
|
+
@pulumi.getter
|
68
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
69
|
+
"""
|
70
|
+
"The accessor (required) property for user pass auth backends".
|
71
|
+
"""
|
72
|
+
return pulumi.get(self, "userpass")
|
73
|
+
|
74
|
+
|
16
75
|
@pulumi.output_type
|
17
76
|
class SecretBackendRolePolicyIdentifier(dict):
|
18
77
|
def __init__(__self__, *,
|
@@ -59,3 +118,53 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
59
118
|
return pulumi.get(self, "notice")
|
60
119
|
|
61
120
|
|
121
|
+
@pulumi.output_type
|
122
|
+
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
123
|
+
def __init__(__self__, *,
|
124
|
+
cert: Optional[Mapping[str, str]] = None):
|
125
|
+
"""
|
126
|
+
:param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
|
127
|
+
"""
|
128
|
+
if cert is not None:
|
129
|
+
pulumi.set(__self__, "cert", cert)
|
130
|
+
|
131
|
+
@property
|
132
|
+
@pulumi.getter
|
133
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
134
|
+
"""
|
135
|
+
The accessor and cert_role properties for cert auth backends
|
136
|
+
"""
|
137
|
+
return pulumi.get(self, "cert")
|
138
|
+
|
139
|
+
|
140
|
+
@pulumi.output_type
|
141
|
+
class GetBackendConfigEstAuthenticatorResult(dict):
|
142
|
+
def __init__(__self__, *,
|
143
|
+
cert: Optional[Mapping[str, str]] = None,
|
144
|
+
userpass: Optional[Mapping[str, str]] = None):
|
145
|
+
"""
|
146
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
147
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
148
|
+
"""
|
149
|
+
if cert is not None:
|
150
|
+
pulumi.set(__self__, "cert", cert)
|
151
|
+
if userpass is not None:
|
152
|
+
pulumi.set(__self__, "userpass", userpass)
|
153
|
+
|
154
|
+
@property
|
155
|
+
@pulumi.getter
|
156
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
157
|
+
"""
|
158
|
+
"The accessor and cert_role properties for cert auth backends".
|
159
|
+
"""
|
160
|
+
return pulumi.get(self, "cert")
|
161
|
+
|
162
|
+
@property
|
163
|
+
@pulumi.getter
|
164
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
165
|
+
"""
|
166
|
+
"The accessor property for user pass auth backends".
|
167
|
+
"""
|
168
|
+
return pulumi.get(self, "userpass")
|
169
|
+
|
170
|
+
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
|
|
45
50
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
46
51
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
47
52
|
The value should not contain leading or trailing forward slashes.
|
48
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
53
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
54
|
*Available only for Vault Enterprise*.
|
50
55
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
51
56
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
|
|
213
218
|
"""
|
214
219
|
The namespace to provision the resource in.
|
215
220
|
The value should not contain leading or trailing forward slashes.
|
216
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
221
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
217
222
|
*Available only for Vault Enterprise*.
|
218
223
|
"""
|
219
224
|
return pulumi.get(self, "namespace")
|
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
|
|
341
346
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
342
347
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
348
|
The value should not contain leading or trailing forward slashes.
|
344
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
349
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
350
|
*Available only for Vault Enterprise*.
|
346
351
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
347
352
|
:param pulumi.Input[str] private_key: The private key
|
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
|
|
579
584
|
"""
|
580
585
|
The namespace to provision the resource in.
|
581
586
|
The value should not contain leading or trailing forward slashes.
|
582
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
583
588
|
*Available only for Vault Enterprise*.
|
584
589
|
"""
|
585
590
|
return pulumi.get(self, "namespace")
|
@@ -735,17 +740,16 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
735
740
|
"""
|
736
741
|
## Example Usage
|
737
742
|
|
738
|
-
<!--Start PulumiCodeChooser -->
|
739
743
|
```python
|
740
744
|
import pulumi
|
741
745
|
import pulumi_vault as vault
|
742
746
|
|
743
747
|
app = vault.pki_secret.SecretBackendCert("app",
|
744
|
-
backend=
|
748
|
+
backend=intermediate["path"],
|
749
|
+
name=test["name"],
|
745
750
|
common_name="app.my.domain",
|
746
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
751
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
747
752
|
```
|
748
|
-
<!--End PulumiCodeChooser -->
|
749
753
|
|
750
754
|
:param str resource_name: The name of the resource.
|
751
755
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -761,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
761
765
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
762
766
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
763
767
|
The value should not contain leading or trailing forward slashes.
|
764
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
768
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
765
769
|
*Available only for Vault Enterprise*.
|
766
770
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
767
771
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -779,17 +783,16 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
779
783
|
"""
|
780
784
|
## Example Usage
|
781
785
|
|
782
|
-
<!--Start PulumiCodeChooser -->
|
783
786
|
```python
|
784
787
|
import pulumi
|
785
788
|
import pulumi_vault as vault
|
786
789
|
|
787
790
|
app = vault.pki_secret.SecretBackendCert("app",
|
788
|
-
backend=
|
791
|
+
backend=intermediate["path"],
|
792
|
+
name=test["name"],
|
789
793
|
common_name="app.my.domain",
|
790
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
794
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
791
795
|
```
|
792
|
-
<!--End PulumiCodeChooser -->
|
793
796
|
|
794
797
|
:param str resource_name: The name of the resource.
|
795
798
|
:param SecretBackendCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -921,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
921
924
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
922
925
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
923
926
|
The value should not contain leading or trailing forward slashes.
|
924
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
927
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
925
928
|
*Available only for Vault Enterprise*.
|
926
929
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
927
930
|
:param pulumi.Input[str] private_key: The private key
|
@@ -1083,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
1083
1086
|
"""
|
1084
1087
|
The namespace to provision the resource in.
|
1085
1088
|
The value should not contain leading or trailing forward slashes.
|
1086
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1089
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1087
1090
|
*Available only for Vault Enterprise*.
|
1088
1091
|
"""
|
1089
1092
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
|
|
23
28
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
|
|
82
87
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -145,13 +150,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
145
150
|
"""
|
146
151
|
## Example Usage
|
147
152
|
|
148
|
-
<!--Start PulumiCodeChooser -->
|
149
153
|
```python
|
150
154
|
import pulumi
|
151
155
|
import pulumi_vault as vault
|
152
156
|
|
153
157
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
154
|
-
backend=
|
158
|
+
backend=intermediate_vault_mount["path"],
|
155
159
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
156
160
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
157
161
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -201,16 +205,15 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
201
205
|
MUR4qFxeUOW/GJGccMUd
|
202
206
|
-----END CERTIFICATE-----
|
203
207
|
\"\"\",
|
204
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
208
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
205
209
|
```
|
206
|
-
<!--End PulumiCodeChooser -->
|
207
210
|
|
208
211
|
:param str resource_name: The name of the resource.
|
209
212
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
210
213
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
211
214
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
212
215
|
The value should not contain leading or trailing forward slashes.
|
213
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
214
217
|
*Available only for Vault Enterprise*.
|
215
218
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
216
219
|
"""
|
@@ -223,13 +226,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
223
226
|
"""
|
224
227
|
## Example Usage
|
225
228
|
|
226
|
-
<!--Start PulumiCodeChooser -->
|
227
229
|
```python
|
228
230
|
import pulumi
|
229
231
|
import pulumi_vault as vault
|
230
232
|
|
231
233
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
232
|
-
backend=
|
234
|
+
backend=intermediate_vault_mount["path"],
|
233
235
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
234
236
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
235
237
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -279,9 +281,8 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
279
281
|
MUR4qFxeUOW/GJGccMUd
|
280
282
|
-----END CERTIFICATE-----
|
281
283
|
\"\"\",
|
282
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
284
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
283
285
|
```
|
284
|
-
<!--End PulumiCodeChooser -->
|
285
286
|
|
286
287
|
:param str resource_name: The name of the resource.
|
287
288
|
:param SecretBackendConfigCaArgs args: The arguments to use to populate this resource's properties.
|
@@ -342,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
342
343
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
343
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
344
345
|
The value should not contain leading or trailing forward slashes.
|
345
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
346
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
346
347
|
*Available only for Vault Enterprise*.
|
347
348
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
348
349
|
"""
|
@@ -369,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
369
370
|
"""
|
370
371
|
The namespace to provision the resource in.
|
371
372
|
The value should not contain leading or trailing forward slashes.
|
372
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
373
374
|
*Available only for Vault Enterprise*.
|
374
375
|
"""
|
375
376
|
return pulumi.get(self, "namespace")
|