pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +59 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +216 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +66 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +110 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
|
@@ -25,7 +30,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
25
30
|
issue and sign operations.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "backend", backend)
|
@@ -65,7 +70,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
65
70
|
"""
|
66
71
|
The namespace to provision the resource in.
|
67
72
|
The value should not contain leading or trailing forward slashes.
|
68
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
73
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
69
74
|
*Available only for Vault Enterprise*.
|
70
75
|
"""
|
71
76
|
return pulumi.get(self, "namespace")
|
@@ -94,7 +99,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
94
99
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
95
100
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
96
101
|
The value should not contain leading or trailing forward slashes.
|
97
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
102
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
98
103
|
*Available only for Vault Enterprise*.
|
99
104
|
"""
|
100
105
|
if backend is not None:
|
@@ -165,7 +170,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
165
170
|
"""
|
166
171
|
The namespace to provision the resource in.
|
167
172
|
The value should not contain leading or trailing forward slashes.
|
168
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
173
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
169
174
|
*Available only for Vault Enterprise*.
|
170
175
|
"""
|
171
176
|
return pulumi.get(self, "namespace")
|
@@ -187,7 +192,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
187
192
|
"""
|
188
193
|
## Example Usage
|
189
194
|
|
190
|
-
<!--Start PulumiCodeChooser -->
|
191
195
|
```python
|
192
196
|
import pulumi
|
193
197
|
import pulumi_vault as vault
|
@@ -204,7 +208,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
204
208
|
description="intermediate",
|
205
209
|
default_lease_ttl_seconds=86400,
|
206
210
|
max_lease_ttl_seconds=86400)
|
207
|
-
|
211
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
208
212
|
backend=root.path,
|
209
213
|
type="internal",
|
210
214
|
common_name="RootOrg Root CA",
|
@@ -219,11 +223,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
219
223
|
country="US",
|
220
224
|
locality="San Francisco",
|
221
225
|
province="CA")
|
222
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
226
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
223
227
|
backend=intermediate.path,
|
224
|
-
type=
|
228
|
+
type=example.type,
|
225
229
|
common_name="SubOrg Intermediate CA")
|
226
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
230
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
227
231
|
backend=root.path,
|
228
232
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
229
233
|
common_name="SubOrg Intermediate CA",
|
@@ -234,11 +238,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
234
238
|
locality="San Francisco",
|
235
239
|
province="CA",
|
236
240
|
revoke=True)
|
237
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
241
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
238
242
|
backend=intermediate.path,
|
239
243
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
240
244
|
```
|
241
|
-
<!--End PulumiCodeChooser -->
|
242
245
|
|
243
246
|
:param str resource_name: The name of the resource.
|
244
247
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -248,7 +251,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
248
251
|
issue and sign operations.
|
249
252
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
250
253
|
The value should not contain leading or trailing forward slashes.
|
251
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
254
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
252
255
|
*Available only for Vault Enterprise*.
|
253
256
|
"""
|
254
257
|
...
|
@@ -260,7 +263,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
260
263
|
"""
|
261
264
|
## Example Usage
|
262
265
|
|
263
|
-
<!--Start PulumiCodeChooser -->
|
264
266
|
```python
|
265
267
|
import pulumi
|
266
268
|
import pulumi_vault as vault
|
@@ -277,7 +279,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
277
279
|
description="intermediate",
|
278
280
|
default_lease_ttl_seconds=86400,
|
279
281
|
max_lease_ttl_seconds=86400)
|
280
|
-
|
282
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
281
283
|
backend=root.path,
|
282
284
|
type="internal",
|
283
285
|
common_name="RootOrg Root CA",
|
@@ -292,11 +294,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
292
294
|
country="US",
|
293
295
|
locality="San Francisco",
|
294
296
|
province="CA")
|
295
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
297
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
296
298
|
backend=intermediate.path,
|
297
|
-
type=
|
299
|
+
type=example.type,
|
298
300
|
common_name="SubOrg Intermediate CA")
|
299
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
301
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
300
302
|
backend=root.path,
|
301
303
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
302
304
|
common_name="SubOrg Intermediate CA",
|
@@ -307,11 +309,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
307
309
|
locality="San Francisco",
|
308
310
|
province="CA",
|
309
311
|
revoke=True)
|
310
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
312
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
311
313
|
backend=intermediate.path,
|
312
314
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
313
315
|
```
|
314
|
-
<!--End PulumiCodeChooser -->
|
315
316
|
|
316
317
|
:param str resource_name: The name of the resource.
|
317
318
|
:param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
|
@@ -380,7 +381,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
380
381
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
381
382
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
382
383
|
The value should not contain leading or trailing forward slashes.
|
383
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
384
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
384
385
|
*Available only for Vault Enterprise*.
|
385
386
|
"""
|
386
387
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -435,7 +436,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
435
436
|
"""
|
436
437
|
The namespace to provision the resource in.
|
437
438
|
The value should not contain leading or trailing forward slashes.
|
438
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
439
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
439
440
|
*Available only for Vault Enterprise*.
|
440
441
|
"""
|
441
442
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
@@ -44,7 +49,7 @@ class SecretBackendIssuerArgs:
|
|
44
49
|
computed CAChain field from, when non-empty.
|
45
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
51
|
The value should not contain leading or trailing forward slashes.
|
47
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
53
|
*Available only for Vault Enterprise*.
|
49
54
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
50
55
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -182,7 +187,7 @@ class SecretBackendIssuerArgs:
|
|
182
187
|
"""
|
183
188
|
The namespace to provision the resource in.
|
184
189
|
The value should not contain leading or trailing forward slashes.
|
185
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
190
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
186
191
|
*Available only for Vault Enterprise*.
|
187
192
|
"""
|
188
193
|
return pulumi.get(self, "namespace")
|
@@ -264,7 +269,7 @@ class _SecretBackendIssuerState:
|
|
264
269
|
computed CAChain field from, when non-empty.
|
265
270
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
266
271
|
The value should not contain leading or trailing forward slashes.
|
267
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
272
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
268
273
|
*Available only for Vault Enterprise*.
|
269
274
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
270
275
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -418,7 +423,7 @@ class _SecretBackendIssuerState:
|
|
418
423
|
"""
|
419
424
|
The namespace to provision the resource in.
|
420
425
|
The value should not contain leading or trailing forward slashes.
|
421
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
426
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
422
427
|
*Available only for Vault Enterprise*.
|
423
428
|
"""
|
424
429
|
return pulumi.get(self, "namespace")
|
@@ -486,7 +491,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
486
491
|
"""
|
487
492
|
## Example Usage
|
488
493
|
|
489
|
-
<!--Start PulumiCodeChooser -->
|
490
494
|
```python
|
491
495
|
import pulumi
|
492
496
|
import pulumi_vault as vault
|
@@ -506,7 +510,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
506
510
|
issuer_ref=root.issuer_id,
|
507
511
|
issuer_name="example-issuer")
|
508
512
|
```
|
509
|
-
<!--End PulumiCodeChooser -->
|
510
513
|
|
511
514
|
## Import
|
512
515
|
|
@@ -534,7 +537,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
534
537
|
computed CAChain field from, when non-empty.
|
535
538
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
536
539
|
The value should not contain leading or trailing forward slashes.
|
537
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
540
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
538
541
|
*Available only for Vault Enterprise*.
|
539
542
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
540
543
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -550,7 +553,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
550
553
|
"""
|
551
554
|
## Example Usage
|
552
555
|
|
553
|
-
<!--Start PulumiCodeChooser -->
|
554
556
|
```python
|
555
557
|
import pulumi
|
556
558
|
import pulumi_vault as vault
|
@@ -570,7 +572,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
570
572
|
issuer_ref=root.issuer_id,
|
571
573
|
issuer_name="example-issuer")
|
572
574
|
```
|
573
|
-
<!--End PulumiCodeChooser -->
|
574
575
|
|
575
576
|
## Import
|
576
577
|
|
@@ -680,7 +681,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
680
681
|
computed CAChain field from, when non-empty.
|
681
682
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
682
683
|
The value should not contain leading or trailing forward slashes.
|
683
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
684
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
684
685
|
*Available only for Vault Enterprise*.
|
685
686
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
686
687
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -790,7 +791,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
790
791
|
"""
|
791
792
|
The namespace to provision the resource in.
|
792
793
|
The value should not contain leading or trailing forward slashes.
|
793
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
794
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
794
795
|
*Available only for Vault Enterprise*.
|
795
796
|
"""
|
796
797
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -37,7 +42,7 @@ class SecretBackendKeyArgs:
|
|
37
42
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
38
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
39
44
|
The value should not contain leading or trailing forward slashes.
|
40
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
45
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
46
|
*Available only for Vault Enterprise*.
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "backend", backend)
|
@@ -149,7 +154,7 @@ class SecretBackendKeyArgs:
|
|
149
154
|
"""
|
150
155
|
The namespace to provision the resource in.
|
151
156
|
The value should not contain leading or trailing forward slashes.
|
152
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
158
|
*Available only for Vault Enterprise*.
|
154
159
|
"""
|
155
160
|
return pulumi.get(self, "namespace")
|
@@ -186,7 +191,7 @@ class _SecretBackendKeyState:
|
|
186
191
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
187
192
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
188
193
|
The value should not contain leading or trailing forward slashes.
|
189
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
194
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
195
|
*Available only for Vault Enterprise*.
|
191
196
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
192
197
|
"""
|
@@ -303,7 +308,7 @@ class _SecretBackendKeyState:
|
|
303
308
|
"""
|
304
309
|
The namespace to provision the resource in.
|
305
310
|
The value should not contain leading or trailing forward slashes.
|
306
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
311
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
307
312
|
*Available only for Vault Enterprise*.
|
308
313
|
"""
|
309
314
|
return pulumi.get(self, "namespace")
|
@@ -364,7 +369,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
364
369
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
365
370
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
366
371
|
The value should not contain leading or trailing forward slashes.
|
367
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
372
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
373
|
*Available only for Vault Enterprise*.
|
369
374
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
370
375
|
"""
|
@@ -469,7 +474,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
469
474
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
470
475
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
471
476
|
The value should not contain leading or trailing forward slashes.
|
472
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
477
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
473
478
|
*Available only for Vault Enterprise*.
|
474
479
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
475
480
|
"""
|
@@ -554,7 +559,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
554
559
|
"""
|
555
560
|
The namespace to provision the resource in.
|
556
561
|
The value should not contain leading or trailing forward slashes.
|
557
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
558
563
|
*Available only for Vault Enterprise*.
|
559
564
|
"""
|
560
565
|
return pulumi.get(self, "namespace")
|