pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +76 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +59 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +216 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2808 -879
- pulumi_vault/database/outputs.py +749 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +7 -0
- pulumi_vault/pkisecret/_inputs.py +115 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
- pulumi_vault/pkisecret/backend_config_acme.py +642 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +109 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +66 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +110 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0.dist-info/RECORD +260 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -33,6 +38,7 @@ class SecretBackendRoleArgs:
|
|
33
38
|
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
39
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
35
40
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
41
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
42
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
37
43
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
38
44
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -81,6 +87,7 @@ class SecretBackendRoleArgs:
|
|
81
87
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
|
82
88
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
83
89
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
90
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
84
91
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
85
92
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
86
93
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -103,7 +110,7 @@ class SecretBackendRoleArgs:
|
|
103
110
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
104
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
112
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
114
|
*Available only for Vault Enterprise*.
|
108
115
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
109
116
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -153,6 +160,8 @@ class SecretBackendRoleArgs:
|
|
153
160
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
154
161
|
if client_flag is not None:
|
155
162
|
pulumi.set(__self__, "client_flag", client_flag)
|
163
|
+
if cn_validations is not None:
|
164
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
156
165
|
if code_signing_flag is not None:
|
157
166
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
158
167
|
if countries is not None:
|
@@ -416,6 +425,18 @@ class SecretBackendRoleArgs:
|
|
416
425
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
417
426
|
pulumi.set(self, "client_flag", value)
|
418
427
|
|
428
|
+
@property
|
429
|
+
@pulumi.getter(name="cnValidations")
|
430
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
431
|
+
"""
|
432
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
433
|
+
"""
|
434
|
+
return pulumi.get(self, "cn_validations")
|
435
|
+
|
436
|
+
@cn_validations.setter
|
437
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
438
|
+
pulumi.set(self, "cn_validations", value)
|
439
|
+
|
419
440
|
@property
|
420
441
|
@pulumi.getter(name="codeSigningFlag")
|
421
442
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -596,7 +617,7 @@ class SecretBackendRoleArgs:
|
|
596
617
|
"""
|
597
618
|
The namespace to provision the resource in.
|
598
619
|
The value should not contain leading or trailing forward slashes.
|
599
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
620
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
600
621
|
*Available only for Vault Enterprise*.
|
601
622
|
"""
|
602
623
|
return pulumi.get(self, "namespace")
|
@@ -794,6 +815,7 @@ class _SecretBackendRoleState:
|
|
794
815
|
backend: Optional[pulumi.Input[str]] = None,
|
795
816
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
796
817
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
818
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
797
819
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
798
820
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
799
821
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -842,6 +864,7 @@ class _SecretBackendRoleState:
|
|
842
864
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
843
865
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
844
866
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
867
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
845
868
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
846
869
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
847
870
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -864,7 +887,7 @@ class _SecretBackendRoleState:
|
|
864
887
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
865
888
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
866
889
|
The value should not contain leading or trailing forward slashes.
|
867
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
890
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
868
891
|
*Available only for Vault Enterprise*.
|
869
892
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
870
893
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -915,6 +938,8 @@ class _SecretBackendRoleState:
|
|
915
938
|
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
916
939
|
if client_flag is not None:
|
917
940
|
pulumi.set(__self__, "client_flag", client_flag)
|
941
|
+
if cn_validations is not None:
|
942
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
918
943
|
if code_signing_flag is not None:
|
919
944
|
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
920
945
|
if countries is not None:
|
@@ -1178,6 +1203,18 @@ class _SecretBackendRoleState:
|
|
1178
1203
|
def client_flag(self, value: Optional[pulumi.Input[bool]]):
|
1179
1204
|
pulumi.set(self, "client_flag", value)
|
1180
1205
|
|
1206
|
+
@property
|
1207
|
+
@pulumi.getter(name="cnValidations")
|
1208
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1209
|
+
"""
|
1210
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1211
|
+
"""
|
1212
|
+
return pulumi.get(self, "cn_validations")
|
1213
|
+
|
1214
|
+
@cn_validations.setter
|
1215
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1216
|
+
pulumi.set(self, "cn_validations", value)
|
1217
|
+
|
1181
1218
|
@property
|
1182
1219
|
@pulumi.getter(name="codeSigningFlag")
|
1183
1220
|
def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1358,7 +1395,7 @@ class _SecretBackendRoleState:
|
|
1358
1395
|
"""
|
1359
1396
|
The namespace to provision the resource in.
|
1360
1397
|
The value should not contain leading or trailing forward slashes.
|
1361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1362
1399
|
*Available only for Vault Enterprise*.
|
1363
1400
|
"""
|
1364
1401
|
return pulumi.get(self, "namespace")
|
@@ -1558,6 +1595,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1558
1595
|
backend: Optional[pulumi.Input[str]] = None,
|
1559
1596
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1560
1597
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1598
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1561
1599
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1562
1600
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1563
1601
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1577,7 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1577
1615
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1578
1616
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1579
1617
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1580
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1618
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1581
1619
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1582
1620
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1583
1621
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1593,7 +1631,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1593
1631
|
|
1594
1632
|
## Example Usage
|
1595
1633
|
|
1596
|
-
<!--Start PulumiCodeChooser -->
|
1597
1634
|
```python
|
1598
1635
|
import pulumi
|
1599
1636
|
import pulumi_vault as vault
|
@@ -1605,6 +1642,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1605
1642
|
max_lease_ttl_seconds=86400)
|
1606
1643
|
role = vault.pki_secret.SecretBackendRole("role",
|
1607
1644
|
backend=pki.path,
|
1645
|
+
name="my_role",
|
1608
1646
|
ttl="3600",
|
1609
1647
|
allow_ip_sans=True,
|
1610
1648
|
key_type="rsa",
|
@@ -1615,7 +1653,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1615
1653
|
],
|
1616
1654
|
allow_subdomains=True)
|
1617
1655
|
```
|
1618
|
-
<!--End PulumiCodeChooser -->
|
1619
1656
|
|
1620
1657
|
## Import
|
1621
1658
|
|
@@ -1644,6 +1681,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1644
1681
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1645
1682
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1646
1683
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1684
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1647
1685
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1648
1686
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1649
1687
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -1666,13 +1704,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1666
1704
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1667
1705
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1668
1706
|
The value should not contain leading or trailing forward slashes.
|
1669
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1707
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1670
1708
|
*Available only for Vault Enterprise*.
|
1671
1709
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1672
1710
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1673
1711
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1674
1712
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1675
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1713
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1676
1714
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1677
1715
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1678
1716
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1694,7 +1732,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1694
1732
|
|
1695
1733
|
## Example Usage
|
1696
1734
|
|
1697
|
-
<!--Start PulumiCodeChooser -->
|
1698
1735
|
```python
|
1699
1736
|
import pulumi
|
1700
1737
|
import pulumi_vault as vault
|
@@ -1706,6 +1743,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1706
1743
|
max_lease_ttl_seconds=86400)
|
1707
1744
|
role = vault.pki_secret.SecretBackendRole("role",
|
1708
1745
|
backend=pki.path,
|
1746
|
+
name="my_role",
|
1709
1747
|
ttl="3600",
|
1710
1748
|
allow_ip_sans=True,
|
1711
1749
|
key_type="rsa",
|
@@ -1716,7 +1754,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1716
1754
|
],
|
1717
1755
|
allow_subdomains=True)
|
1718
1756
|
```
|
1719
|
-
<!--End PulumiCodeChooser -->
|
1720
1757
|
|
1721
1758
|
## Import
|
1722
1759
|
|
@@ -1758,6 +1795,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1758
1795
|
backend: Optional[pulumi.Input[str]] = None,
|
1759
1796
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1760
1797
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1798
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1761
1799
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1762
1800
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1763
1801
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1777,7 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1777
1815
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1778
1816
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1779
1817
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1780
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1818
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1781
1819
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1782
1820
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1783
1821
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1815,6 +1853,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1815
1853
|
__props__.__dict__["backend"] = backend
|
1816
1854
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
1817
1855
|
__props__.__dict__["client_flag"] = client_flag
|
1856
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
1818
1857
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
1819
1858
|
__props__.__dict__["countries"] = countries
|
1820
1859
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -1871,6 +1910,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1871
1910
|
backend: Optional[pulumi.Input[str]] = None,
|
1872
1911
|
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
|
1873
1912
|
client_flag: Optional[pulumi.Input[bool]] = None,
|
1913
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1874
1914
|
code_signing_flag: Optional[pulumi.Input[bool]] = None,
|
1875
1915
|
countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1876
1916
|
email_protection_flag: Optional[pulumi.Input[bool]] = None,
|
@@ -1890,7 +1930,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1890
1930
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1891
1931
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1892
1932
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1893
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1933
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1894
1934
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1895
1935
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1896
1936
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1924,6 +1964,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1924
1964
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
1925
1965
|
:param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
1926
1966
|
:param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
|
1967
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
1927
1968
|
:param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
|
1928
1969
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
|
1929
1970
|
:param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
|
@@ -1946,13 +1987,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1946
1987
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1947
1988
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1948
1989
|
The value should not contain leading or trailing forward slashes.
|
1949
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1990
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1950
1991
|
*Available only for Vault Enterprise*.
|
1951
1992
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1952
1993
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1953
1994
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1954
1995
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1955
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1996
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1956
1997
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1957
1998
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1958
1999
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1984,6 +2025,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1984
2025
|
__props__.__dict__["backend"] = backend
|
1985
2026
|
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
1986
2027
|
__props__.__dict__["client_flag"] = client_flag
|
2028
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
1987
2029
|
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
1988
2030
|
__props__.__dict__["countries"] = countries
|
1989
2031
|
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
@@ -2151,6 +2193,14 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2151
2193
|
"""
|
2152
2194
|
return pulumi.get(self, "client_flag")
|
2153
2195
|
|
2196
|
+
@property
|
2197
|
+
@pulumi.getter(name="cnValidations")
|
2198
|
+
def cn_validations(self) -> pulumi.Output[Sequence[str]]:
|
2199
|
+
"""
|
2200
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
2201
|
+
"""
|
2202
|
+
return pulumi.get(self, "cn_validations")
|
2203
|
+
|
2154
2204
|
@property
|
2155
2205
|
@pulumi.getter(name="codeSigningFlag")
|
2156
2206
|
def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
|
@@ -2275,7 +2325,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2275
2325
|
"""
|
2276
2326
|
The namespace to provision the resource in.
|
2277
2327
|
The value should not contain leading or trailing forward slashes.
|
2278
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
2328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
2279
2329
|
*Available only for Vault Enterprise*.
|
2280
2330
|
"""
|
2281
2331
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
|
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
|
|
69
74
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
70
75
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
:param pulumi.Input[str] organization: The organization
|
75
80
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
|
|
352
357
|
"""
|
353
358
|
The namespace to provision the resource in.
|
354
359
|
The value should not contain leading or trailing forward slashes.
|
355
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
360
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
356
361
|
*Available only for Vault Enterprise*.
|
357
362
|
"""
|
358
363
|
return pulumi.get(self, "namespace")
|
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
|
|
513
518
|
postal_code: Optional[pulumi.Input[str]] = None,
|
514
519
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
515
520
|
province: Optional[pulumi.Input[str]] = None,
|
516
|
-
serial: Optional[pulumi.Input[str]] = None,
|
517
521
|
serial_number: Optional[pulumi.Input[str]] = None,
|
518
522
|
street_address: Optional[pulumi.Input[str]] = None,
|
519
523
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
|
|
548
552
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
549
553
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
550
554
|
The value should not contain leading or trailing forward slashes.
|
551
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
555
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
552
556
|
*Available only for Vault Enterprise*.
|
553
557
|
:param pulumi.Input[str] organization: The organization
|
554
558
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
|
|
557
561
|
:param pulumi.Input[str] postal_code: The postal code
|
558
562
|
:param pulumi.Input[str] private_key_format: The private key format
|
559
563
|
:param pulumi.Input[str] province: The province
|
560
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
561
564
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
562
565
|
:param pulumi.Input[str] street_address: The street address
|
563
566
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
|
|
621
624
|
pulumi.set(__self__, "private_key_format", private_key_format)
|
622
625
|
if province is not None:
|
623
626
|
pulumi.set(__self__, "province", province)
|
624
|
-
if serial is not None:
|
625
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
626
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
627
|
-
if serial is not None:
|
628
|
-
pulumi.set(__self__, "serial", serial)
|
629
627
|
if serial_number is not None:
|
630
628
|
pulumi.set(__self__, "serial_number", serial_number)
|
631
629
|
if street_address is not None:
|
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
|
|
888
886
|
"""
|
889
887
|
The namespace to provision the resource in.
|
890
888
|
The value should not contain leading or trailing forward slashes.
|
891
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
889
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
892
890
|
*Available only for Vault Enterprise*.
|
893
891
|
"""
|
894
892
|
return pulumi.get(self, "namespace")
|
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
|
|
981
979
|
def province(self, value: Optional[pulumi.Input[str]]):
|
982
980
|
pulumi.set(self, "province", value)
|
983
981
|
|
984
|
-
@property
|
985
|
-
@pulumi.getter
|
986
|
-
def serial(self) -> Optional[pulumi.Input[str]]:
|
987
|
-
"""
|
988
|
-
Deprecated, use `serial_number` instead.
|
989
|
-
"""
|
990
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
991
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
992
|
-
|
993
|
-
return pulumi.get(self, "serial")
|
994
|
-
|
995
|
-
@serial.setter
|
996
|
-
def serial(self, value: Optional[pulumi.Input[str]]):
|
997
|
-
pulumi.set(self, "serial", value)
|
998
|
-
|
999
982
|
@property
|
1000
983
|
@pulumi.getter(name="serialNumber")
|
1001
984
|
def serial_number(self) -> Optional[pulumi.Input[str]]:
|
@@ -1095,13 +1078,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1095
1078
|
"""
|
1096
1079
|
## Example Usage
|
1097
1080
|
|
1098
|
-
<!--Start PulumiCodeChooser -->
|
1099
1081
|
```python
|
1100
1082
|
import pulumi
|
1101
1083
|
import pulumi_vault as vault
|
1102
1084
|
|
1103
1085
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1104
|
-
backend=
|
1086
|
+
backend=pki["path"],
|
1105
1087
|
type="internal",
|
1106
1088
|
common_name="Root CA",
|
1107
1089
|
ttl="315360000",
|
@@ -1112,9 +1094,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1112
1094
|
exclude_cn_from_sans=True,
|
1113
1095
|
ou="My OU",
|
1114
1096
|
organization="My organization",
|
1115
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1097
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1116
1098
|
```
|
1117
|
-
<!--End PulumiCodeChooser -->
|
1118
1099
|
|
1119
1100
|
:param str resource_name: The name of the resource.
|
1120
1101
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1141,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1141
1122
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1142
1123
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1143
1124
|
The value should not contain leading or trailing forward slashes.
|
1144
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1125
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1145
1126
|
*Available only for Vault Enterprise*.
|
1146
1127
|
:param pulumi.Input[str] organization: The organization
|
1147
1128
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1165,13 +1146,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1165
1146
|
"""
|
1166
1147
|
## Example Usage
|
1167
1148
|
|
1168
|
-
<!--Start PulumiCodeChooser -->
|
1169
1149
|
```python
|
1170
1150
|
import pulumi
|
1171
1151
|
import pulumi_vault as vault
|
1172
1152
|
|
1173
1153
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1174
|
-
backend=
|
1154
|
+
backend=pki["path"],
|
1175
1155
|
type="internal",
|
1176
1156
|
common_name="Root CA",
|
1177
1157
|
ttl="315360000",
|
@@ -1182,9 +1162,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1182
1162
|
exclude_cn_from_sans=True,
|
1183
1163
|
ou="My OU",
|
1184
1164
|
organization="My organization",
|
1185
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1165
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1186
1166
|
```
|
1187
|
-
<!--End PulumiCodeChooser -->
|
1188
1167
|
|
1189
1168
|
:param str resource_name: The name of the resource.
|
1190
1169
|
:param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -1276,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1276
1255
|
__props__.__dict__["issuer_id"] = None
|
1277
1256
|
__props__.__dict__["issuing_ca"] = None
|
1278
1257
|
__props__.__dict__["key_id"] = None
|
1279
|
-
__props__.__dict__["serial"] = None
|
1280
1258
|
__props__.__dict__["serial_number"] = None
|
1281
1259
|
super(SecretBackendRootCert, __self__).__init__(
|
1282
1260
|
'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
|
@@ -1316,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1316
1294
|
postal_code: Optional[pulumi.Input[str]] = None,
|
1317
1295
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
1318
1296
|
province: Optional[pulumi.Input[str]] = None,
|
1319
|
-
serial: Optional[pulumi.Input[str]] = None,
|
1320
1297
|
serial_number: Optional[pulumi.Input[str]] = None,
|
1321
1298
|
street_address: Optional[pulumi.Input[str]] = None,
|
1322
1299
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -1356,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1356
1333
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1357
1334
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1358
1335
|
The value should not contain leading or trailing forward slashes.
|
1359
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1336
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1360
1337
|
*Available only for Vault Enterprise*.
|
1361
1338
|
:param pulumi.Input[str] organization: The organization
|
1362
1339
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1365,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1365
1342
|
:param pulumi.Input[str] postal_code: The postal code
|
1366
1343
|
:param pulumi.Input[str] private_key_format: The private key format
|
1367
1344
|
:param pulumi.Input[str] province: The province
|
1368
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
1369
1345
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
1370
1346
|
:param pulumi.Input[str] street_address: The street address
|
1371
1347
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -1405,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1405
1381
|
__props__.__dict__["postal_code"] = postal_code
|
1406
1382
|
__props__.__dict__["private_key_format"] = private_key_format
|
1407
1383
|
__props__.__dict__["province"] = province
|
1408
|
-
__props__.__dict__["serial"] = serial
|
1409
1384
|
__props__.__dict__["serial_number"] = serial_number
|
1410
1385
|
__props__.__dict__["street_address"] = street_address
|
1411
1386
|
__props__.__dict__["ttl"] = ttl
|
@@ -1584,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1584
1559
|
"""
|
1585
1560
|
The namespace to provision the resource in.
|
1586
1561
|
The value should not contain leading or trailing forward slashes.
|
1587
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1588
1563
|
*Available only for Vault Enterprise*.
|
1589
1564
|
"""
|
1590
1565
|
return pulumi.get(self, "namespace")
|
@@ -1645,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1645
1620
|
"""
|
1646
1621
|
return pulumi.get(self, "province")
|
1647
1622
|
|
1648
|
-
@property
|
1649
|
-
@pulumi.getter
|
1650
|
-
def serial(self) -> pulumi.Output[str]:
|
1651
|
-
"""
|
1652
|
-
Deprecated, use `serial_number` instead.
|
1653
|
-
"""
|
1654
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
1655
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
1656
|
-
|
1657
|
-
return pulumi.get(self, "serial")
|
1658
|
-
|
1659
1623
|
@property
|
1660
1624
|
@pulumi.getter(name="serialNumber")
|
1661
1625
|
def serial_number(self) -> pulumi.Output[str]:
|