pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,369 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import sys
|
8
|
+
import pulumi
|
9
|
+
import pulumi.runtime
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
|
+
from .. import _utilities
|
16
|
+
|
17
|
+
__all__ = ['BackendConfigClusterArgs', 'BackendConfigCluster']
|
18
|
+
|
19
|
+
@pulumi.input_type
|
20
|
+
class BackendConfigClusterArgs:
|
21
|
+
def __init__(__self__, *,
|
22
|
+
backend: pulumi.Input[str],
|
23
|
+
aia_path: Optional[pulumi.Input[str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
+
path: Optional[pulumi.Input[str]] = None):
|
26
|
+
"""
|
27
|
+
The set of arguments for constructing a BackendConfigCluster resource.
|
28
|
+
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
29
|
+
:param pulumi.Input[str] aia_path: Specifies the path to this performance replication cluster's AIA distribution point.
|
30
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
|
+
The value should not contain leading or trailing forward slashes.
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
|
+
*Available only for Vault Enterprise*.
|
34
|
+
:param pulumi.Input[str] path: Specifies the path to this performance replication cluster's API mount path.
|
35
|
+
"""
|
36
|
+
pulumi.set(__self__, "backend", backend)
|
37
|
+
if aia_path is not None:
|
38
|
+
pulumi.set(__self__, "aia_path", aia_path)
|
39
|
+
if namespace is not None:
|
40
|
+
pulumi.set(__self__, "namespace", namespace)
|
41
|
+
if path is not None:
|
42
|
+
pulumi.set(__self__, "path", path)
|
43
|
+
|
44
|
+
@property
|
45
|
+
@pulumi.getter
|
46
|
+
def backend(self) -> pulumi.Input[str]:
|
47
|
+
"""
|
48
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
49
|
+
"""
|
50
|
+
return pulumi.get(self, "backend")
|
51
|
+
|
52
|
+
@backend.setter
|
53
|
+
def backend(self, value: pulumi.Input[str]):
|
54
|
+
pulumi.set(self, "backend", value)
|
55
|
+
|
56
|
+
@property
|
57
|
+
@pulumi.getter(name="aiaPath")
|
58
|
+
def aia_path(self) -> Optional[pulumi.Input[str]]:
|
59
|
+
"""
|
60
|
+
Specifies the path to this performance replication cluster's AIA distribution point.
|
61
|
+
"""
|
62
|
+
return pulumi.get(self, "aia_path")
|
63
|
+
|
64
|
+
@aia_path.setter
|
65
|
+
def aia_path(self, value: Optional[pulumi.Input[str]]):
|
66
|
+
pulumi.set(self, "aia_path", value)
|
67
|
+
|
68
|
+
@property
|
69
|
+
@pulumi.getter
|
70
|
+
def namespace(self) -> Optional[pulumi.Input[str]]:
|
71
|
+
"""
|
72
|
+
The namespace to provision the resource in.
|
73
|
+
The value should not contain leading or trailing forward slashes.
|
74
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
75
|
+
*Available only for Vault Enterprise*.
|
76
|
+
"""
|
77
|
+
return pulumi.get(self, "namespace")
|
78
|
+
|
79
|
+
@namespace.setter
|
80
|
+
def namespace(self, value: Optional[pulumi.Input[str]]):
|
81
|
+
pulumi.set(self, "namespace", value)
|
82
|
+
|
83
|
+
@property
|
84
|
+
@pulumi.getter
|
85
|
+
def path(self) -> Optional[pulumi.Input[str]]:
|
86
|
+
"""
|
87
|
+
Specifies the path to this performance replication cluster's API mount path.
|
88
|
+
"""
|
89
|
+
return pulumi.get(self, "path")
|
90
|
+
|
91
|
+
@path.setter
|
92
|
+
def path(self, value: Optional[pulumi.Input[str]]):
|
93
|
+
pulumi.set(self, "path", value)
|
94
|
+
|
95
|
+
|
96
|
+
@pulumi.input_type
|
97
|
+
class _BackendConfigClusterState:
|
98
|
+
def __init__(__self__, *,
|
99
|
+
aia_path: Optional[pulumi.Input[str]] = None,
|
100
|
+
backend: Optional[pulumi.Input[str]] = None,
|
101
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
102
|
+
path: Optional[pulumi.Input[str]] = None):
|
103
|
+
"""
|
104
|
+
Input properties used for looking up and filtering BackendConfigCluster resources.
|
105
|
+
:param pulumi.Input[str] aia_path: Specifies the path to this performance replication cluster's AIA distribution point.
|
106
|
+
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
107
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
108
|
+
The value should not contain leading or trailing forward slashes.
|
109
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
110
|
+
*Available only for Vault Enterprise*.
|
111
|
+
:param pulumi.Input[str] path: Specifies the path to this performance replication cluster's API mount path.
|
112
|
+
"""
|
113
|
+
if aia_path is not None:
|
114
|
+
pulumi.set(__self__, "aia_path", aia_path)
|
115
|
+
if backend is not None:
|
116
|
+
pulumi.set(__self__, "backend", backend)
|
117
|
+
if namespace is not None:
|
118
|
+
pulumi.set(__self__, "namespace", namespace)
|
119
|
+
if path is not None:
|
120
|
+
pulumi.set(__self__, "path", path)
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter(name="aiaPath")
|
124
|
+
def aia_path(self) -> Optional[pulumi.Input[str]]:
|
125
|
+
"""
|
126
|
+
Specifies the path to this performance replication cluster's AIA distribution point.
|
127
|
+
"""
|
128
|
+
return pulumi.get(self, "aia_path")
|
129
|
+
|
130
|
+
@aia_path.setter
|
131
|
+
def aia_path(self, value: Optional[pulumi.Input[str]]):
|
132
|
+
pulumi.set(self, "aia_path", value)
|
133
|
+
|
134
|
+
@property
|
135
|
+
@pulumi.getter
|
136
|
+
def backend(self) -> Optional[pulumi.Input[str]]:
|
137
|
+
"""
|
138
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
139
|
+
"""
|
140
|
+
return pulumi.get(self, "backend")
|
141
|
+
|
142
|
+
@backend.setter
|
143
|
+
def backend(self, value: Optional[pulumi.Input[str]]):
|
144
|
+
pulumi.set(self, "backend", value)
|
145
|
+
|
146
|
+
@property
|
147
|
+
@pulumi.getter
|
148
|
+
def namespace(self) -> Optional[pulumi.Input[str]]:
|
149
|
+
"""
|
150
|
+
The namespace to provision the resource in.
|
151
|
+
The value should not contain leading or trailing forward slashes.
|
152
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
|
+
*Available only for Vault Enterprise*.
|
154
|
+
"""
|
155
|
+
return pulumi.get(self, "namespace")
|
156
|
+
|
157
|
+
@namespace.setter
|
158
|
+
def namespace(self, value: Optional[pulumi.Input[str]]):
|
159
|
+
pulumi.set(self, "namespace", value)
|
160
|
+
|
161
|
+
@property
|
162
|
+
@pulumi.getter
|
163
|
+
def path(self) -> Optional[pulumi.Input[str]]:
|
164
|
+
"""
|
165
|
+
Specifies the path to this performance replication cluster's API mount path.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "path")
|
168
|
+
|
169
|
+
@path.setter
|
170
|
+
def path(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
pulumi.set(self, "path", value)
|
172
|
+
|
173
|
+
|
174
|
+
class BackendConfigCluster(pulumi.CustomResource):
|
175
|
+
@overload
|
176
|
+
def __init__(__self__,
|
177
|
+
resource_name: str,
|
178
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
179
|
+
aia_path: Optional[pulumi.Input[str]] = None,
|
180
|
+
backend: Optional[pulumi.Input[str]] = None,
|
181
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
182
|
+
path: Optional[pulumi.Input[str]] = None,
|
183
|
+
__props__=None):
|
184
|
+
"""
|
185
|
+
Allows setting the cluster-local's API mount path and AIA distribution point on a particular performance replication cluster.
|
186
|
+
|
187
|
+
## Example Usage
|
188
|
+
|
189
|
+
```python
|
190
|
+
import pulumi
|
191
|
+
import pulumi_vault as vault
|
192
|
+
|
193
|
+
root = vault.Mount("root",
|
194
|
+
path="pki-root",
|
195
|
+
type="pki",
|
196
|
+
description="root PKI",
|
197
|
+
default_lease_ttl_seconds=8640000,
|
198
|
+
max_lease_ttl_seconds=8640000)
|
199
|
+
example = vault.pki_secret.BackendConfigCluster("example",
|
200
|
+
backend=root.path,
|
201
|
+
path="http://127.0.0.1:8200/v1/pki-root",
|
202
|
+
aia_path="http://127.0.0.1:8200/v1/pki-root")
|
203
|
+
```
|
204
|
+
|
205
|
+
## Import
|
206
|
+
|
207
|
+
The PKI config cluster can be imported using the resource's `id`.
|
208
|
+
In the case of the example above the `id` would be `pki-root/config/cluster`,
|
209
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
210
|
+
|
211
|
+
```sh
|
212
|
+
$ pulumi import vault:pkiSecret/backendConfigCluster:BackendConfigCluster example pki-root/config/cluster
|
213
|
+
```
|
214
|
+
|
215
|
+
:param str resource_name: The name of the resource.
|
216
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
217
|
+
:param pulumi.Input[str] aia_path: Specifies the path to this performance replication cluster's AIA distribution point.
|
218
|
+
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
219
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
220
|
+
The value should not contain leading or trailing forward slashes.
|
221
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
222
|
+
*Available only for Vault Enterprise*.
|
223
|
+
:param pulumi.Input[str] path: Specifies the path to this performance replication cluster's API mount path.
|
224
|
+
"""
|
225
|
+
...
|
226
|
+
@overload
|
227
|
+
def __init__(__self__,
|
228
|
+
resource_name: str,
|
229
|
+
args: BackendConfigClusterArgs,
|
230
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
231
|
+
"""
|
232
|
+
Allows setting the cluster-local's API mount path and AIA distribution point on a particular performance replication cluster.
|
233
|
+
|
234
|
+
## Example Usage
|
235
|
+
|
236
|
+
```python
|
237
|
+
import pulumi
|
238
|
+
import pulumi_vault as vault
|
239
|
+
|
240
|
+
root = vault.Mount("root",
|
241
|
+
path="pki-root",
|
242
|
+
type="pki",
|
243
|
+
description="root PKI",
|
244
|
+
default_lease_ttl_seconds=8640000,
|
245
|
+
max_lease_ttl_seconds=8640000)
|
246
|
+
example = vault.pki_secret.BackendConfigCluster("example",
|
247
|
+
backend=root.path,
|
248
|
+
path="http://127.0.0.1:8200/v1/pki-root",
|
249
|
+
aia_path="http://127.0.0.1:8200/v1/pki-root")
|
250
|
+
```
|
251
|
+
|
252
|
+
## Import
|
253
|
+
|
254
|
+
The PKI config cluster can be imported using the resource's `id`.
|
255
|
+
In the case of the example above the `id` would be `pki-root/config/cluster`,
|
256
|
+
where the `pki-root` component is the resource's `backend`, e.g.
|
257
|
+
|
258
|
+
```sh
|
259
|
+
$ pulumi import vault:pkiSecret/backendConfigCluster:BackendConfigCluster example pki-root/config/cluster
|
260
|
+
```
|
261
|
+
|
262
|
+
:param str resource_name: The name of the resource.
|
263
|
+
:param BackendConfigClusterArgs args: The arguments to use to populate this resource's properties.
|
264
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
265
|
+
"""
|
266
|
+
...
|
267
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
268
|
+
resource_args, opts = _utilities.get_resource_args_opts(BackendConfigClusterArgs, pulumi.ResourceOptions, *args, **kwargs)
|
269
|
+
if resource_args is not None:
|
270
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
271
|
+
else:
|
272
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
273
|
+
|
274
|
+
def _internal_init(__self__,
|
275
|
+
resource_name: str,
|
276
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
277
|
+
aia_path: Optional[pulumi.Input[str]] = None,
|
278
|
+
backend: Optional[pulumi.Input[str]] = None,
|
279
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
280
|
+
path: Optional[pulumi.Input[str]] = None,
|
281
|
+
__props__=None):
|
282
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
283
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
284
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
285
|
+
if opts.id is None:
|
286
|
+
if __props__ is not None:
|
287
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
288
|
+
__props__ = BackendConfigClusterArgs.__new__(BackendConfigClusterArgs)
|
289
|
+
|
290
|
+
__props__.__dict__["aia_path"] = aia_path
|
291
|
+
if backend is None and not opts.urn:
|
292
|
+
raise TypeError("Missing required property 'backend'")
|
293
|
+
__props__.__dict__["backend"] = backend
|
294
|
+
__props__.__dict__["namespace"] = namespace
|
295
|
+
__props__.__dict__["path"] = path
|
296
|
+
super(BackendConfigCluster, __self__).__init__(
|
297
|
+
'vault:pkiSecret/backendConfigCluster:BackendConfigCluster',
|
298
|
+
resource_name,
|
299
|
+
__props__,
|
300
|
+
opts)
|
301
|
+
|
302
|
+
@staticmethod
|
303
|
+
def get(resource_name: str,
|
304
|
+
id: pulumi.Input[str],
|
305
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
306
|
+
aia_path: Optional[pulumi.Input[str]] = None,
|
307
|
+
backend: Optional[pulumi.Input[str]] = None,
|
308
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
309
|
+
path: Optional[pulumi.Input[str]] = None) -> 'BackendConfigCluster':
|
310
|
+
"""
|
311
|
+
Get an existing BackendConfigCluster resource's state with the given name, id, and optional extra
|
312
|
+
properties used to qualify the lookup.
|
313
|
+
|
314
|
+
:param str resource_name: The unique name of the resulting resource.
|
315
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
316
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
317
|
+
:param pulumi.Input[str] aia_path: Specifies the path to this performance replication cluster's AIA distribution point.
|
318
|
+
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
319
|
+
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
320
|
+
The value should not contain leading or trailing forward slashes.
|
321
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
322
|
+
*Available only for Vault Enterprise*.
|
323
|
+
:param pulumi.Input[str] path: Specifies the path to this performance replication cluster's API mount path.
|
324
|
+
"""
|
325
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
326
|
+
|
327
|
+
__props__ = _BackendConfigClusterState.__new__(_BackendConfigClusterState)
|
328
|
+
|
329
|
+
__props__.__dict__["aia_path"] = aia_path
|
330
|
+
__props__.__dict__["backend"] = backend
|
331
|
+
__props__.__dict__["namespace"] = namespace
|
332
|
+
__props__.__dict__["path"] = path
|
333
|
+
return BackendConfigCluster(resource_name, opts=opts, __props__=__props__)
|
334
|
+
|
335
|
+
@property
|
336
|
+
@pulumi.getter(name="aiaPath")
|
337
|
+
def aia_path(self) -> pulumi.Output[Optional[str]]:
|
338
|
+
"""
|
339
|
+
Specifies the path to this performance replication cluster's AIA distribution point.
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "aia_path")
|
342
|
+
|
343
|
+
@property
|
344
|
+
@pulumi.getter
|
345
|
+
def backend(self) -> pulumi.Output[str]:
|
346
|
+
"""
|
347
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
348
|
+
"""
|
349
|
+
return pulumi.get(self, "backend")
|
350
|
+
|
351
|
+
@property
|
352
|
+
@pulumi.getter
|
353
|
+
def namespace(self) -> pulumi.Output[Optional[str]]:
|
354
|
+
"""
|
355
|
+
The namespace to provision the resource in.
|
356
|
+
The value should not contain leading or trailing forward slashes.
|
357
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
358
|
+
*Available only for Vault Enterprise*.
|
359
|
+
"""
|
360
|
+
return pulumi.get(self, "namespace")
|
361
|
+
|
362
|
+
@property
|
363
|
+
@pulumi.getter
|
364
|
+
def path(self) -> pulumi.Output[Optional[str]]:
|
365
|
+
"""
|
366
|
+
Specifies the path to this performance replication cluster's API mount path.
|
367
|
+
"""
|
368
|
+
return pulumi.get(self, "path")
|
369
|
+
|