pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
@@ -44,7 +49,7 @@ class SecretBackendIssuerArgs:
|
|
44
49
|
computed CAChain field from, when non-empty.
|
45
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
51
|
The value should not contain leading or trailing forward slashes.
|
47
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
53
|
*Available only for Vault Enterprise*.
|
49
54
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
50
55
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -182,7 +187,7 @@ class SecretBackendIssuerArgs:
|
|
182
187
|
"""
|
183
188
|
The namespace to provision the resource in.
|
184
189
|
The value should not contain leading or trailing forward slashes.
|
185
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
190
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
186
191
|
*Available only for Vault Enterprise*.
|
187
192
|
"""
|
188
193
|
return pulumi.get(self, "namespace")
|
@@ -264,7 +269,7 @@ class _SecretBackendIssuerState:
|
|
264
269
|
computed CAChain field from, when non-empty.
|
265
270
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
266
271
|
The value should not contain leading or trailing forward slashes.
|
267
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
272
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
268
273
|
*Available only for Vault Enterprise*.
|
269
274
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
270
275
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -418,7 +423,7 @@ class _SecretBackendIssuerState:
|
|
418
423
|
"""
|
419
424
|
The namespace to provision the resource in.
|
420
425
|
The value should not contain leading or trailing forward slashes.
|
421
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
426
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
422
427
|
*Available only for Vault Enterprise*.
|
423
428
|
"""
|
424
429
|
return pulumi.get(self, "namespace")
|
@@ -486,7 +491,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
486
491
|
"""
|
487
492
|
## Example Usage
|
488
493
|
|
489
|
-
<!--Start PulumiCodeChooser -->
|
490
494
|
```python
|
491
495
|
import pulumi
|
492
496
|
import pulumi_vault as vault
|
@@ -506,7 +510,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
506
510
|
issuer_ref=root.issuer_id,
|
507
511
|
issuer_name="example-issuer")
|
508
512
|
```
|
509
|
-
<!--End PulumiCodeChooser -->
|
510
513
|
|
511
514
|
## Import
|
512
515
|
|
@@ -534,7 +537,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
534
537
|
computed CAChain field from, when non-empty.
|
535
538
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
536
539
|
The value should not contain leading or trailing forward slashes.
|
537
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
540
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
538
541
|
*Available only for Vault Enterprise*.
|
539
542
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
540
543
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -550,7 +553,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
550
553
|
"""
|
551
554
|
## Example Usage
|
552
555
|
|
553
|
-
<!--Start PulumiCodeChooser -->
|
554
556
|
```python
|
555
557
|
import pulumi
|
556
558
|
import pulumi_vault as vault
|
@@ -570,7 +572,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
570
572
|
issuer_ref=root.issuer_id,
|
571
573
|
issuer_name="example-issuer")
|
572
574
|
```
|
573
|
-
<!--End PulumiCodeChooser -->
|
574
575
|
|
575
576
|
## Import
|
576
577
|
|
@@ -680,7 +681,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
680
681
|
computed CAChain field from, when non-empty.
|
681
682
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
682
683
|
The value should not contain leading or trailing forward slashes.
|
683
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
684
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
684
685
|
*Available only for Vault Enterprise*.
|
685
686
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
686
687
|
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
@@ -790,7 +791,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
790
791
|
"""
|
791
792
|
The namespace to provision the resource in.
|
792
793
|
The value should not contain leading or trailing forward slashes.
|
793
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
794
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
794
795
|
*Available only for Vault Enterprise*.
|
795
796
|
"""
|
796
797
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
|
@@ -37,7 +42,7 @@ class SecretBackendKeyArgs:
|
|
37
42
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
38
43
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
39
44
|
The value should not contain leading or trailing forward slashes.
|
40
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
45
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
41
46
|
*Available only for Vault Enterprise*.
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "backend", backend)
|
@@ -149,7 +154,7 @@ class SecretBackendKeyArgs:
|
|
149
154
|
"""
|
150
155
|
The namespace to provision the resource in.
|
151
156
|
The value should not contain leading or trailing forward slashes.
|
152
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
157
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
158
|
*Available only for Vault Enterprise*.
|
154
159
|
"""
|
155
160
|
return pulumi.get(self, "namespace")
|
@@ -186,7 +191,7 @@ class _SecretBackendKeyState:
|
|
186
191
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
187
192
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
188
193
|
The value should not contain leading or trailing forward slashes.
|
189
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
194
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
195
|
*Available only for Vault Enterprise*.
|
191
196
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
192
197
|
"""
|
@@ -303,7 +308,7 @@ class _SecretBackendKeyState:
|
|
303
308
|
"""
|
304
309
|
The namespace to provision the resource in.
|
305
310
|
The value should not contain leading or trailing forward slashes.
|
306
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
311
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
307
312
|
*Available only for Vault Enterprise*.
|
308
313
|
"""
|
309
314
|
return pulumi.get(self, "namespace")
|
@@ -364,7 +369,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
364
369
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
365
370
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
366
371
|
The value should not contain leading or trailing forward slashes.
|
367
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
372
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
373
|
*Available only for Vault Enterprise*.
|
369
374
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
370
375
|
"""
|
@@ -469,7 +474,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
469
474
|
:param pulumi.Input[str] managed_key_name: The managed key's configured name.
|
470
475
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
471
476
|
The value should not contain leading or trailing forward slashes.
|
472
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
477
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
473
478
|
*Available only for Vault Enterprise*.
|
474
479
|
:param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
|
475
480
|
"""
|
@@ -554,7 +559,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
554
559
|
"""
|
555
560
|
The namespace to provision the resource in.
|
556
561
|
The value should not contain leading or trailing forward slashes.
|
557
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
558
563
|
*Available only for Vault Enterprise*.
|
559
564
|
"""
|
560
565
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -103,7 +108,7 @@ class SecretBackendRoleArgs:
|
|
103
108
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
104
109
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
110
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
111
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
112
|
*Available only for Vault Enterprise*.
|
108
113
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
109
114
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -596,7 +601,7 @@ class SecretBackendRoleArgs:
|
|
596
601
|
"""
|
597
602
|
The namespace to provision the resource in.
|
598
603
|
The value should not contain leading or trailing forward slashes.
|
599
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
604
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
600
605
|
*Available only for Vault Enterprise*.
|
601
606
|
"""
|
602
607
|
return pulumi.get(self, "namespace")
|
@@ -864,7 +869,7 @@ class _SecretBackendRoleState:
|
|
864
869
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
865
870
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
866
871
|
The value should not contain leading or trailing forward slashes.
|
867
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
872
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
868
873
|
*Available only for Vault Enterprise*.
|
869
874
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
870
875
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
@@ -1358,7 +1363,7 @@ class _SecretBackendRoleState:
|
|
1358
1363
|
"""
|
1359
1364
|
The namespace to provision the resource in.
|
1360
1365
|
The value should not contain leading or trailing forward slashes.
|
1361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1366
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1362
1367
|
*Available only for Vault Enterprise*.
|
1363
1368
|
"""
|
1364
1369
|
return pulumi.get(self, "namespace")
|
@@ -1577,7 +1582,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1577
1582
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1578
1583
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1579
1584
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1580
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1585
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1581
1586
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1582
1587
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1583
1588
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1593,7 +1598,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1593
1598
|
|
1594
1599
|
## Example Usage
|
1595
1600
|
|
1596
|
-
<!--Start PulumiCodeChooser -->
|
1597
1601
|
```python
|
1598
1602
|
import pulumi
|
1599
1603
|
import pulumi_vault as vault
|
@@ -1605,6 +1609,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1605
1609
|
max_lease_ttl_seconds=86400)
|
1606
1610
|
role = vault.pki_secret.SecretBackendRole("role",
|
1607
1611
|
backend=pki.path,
|
1612
|
+
name="my_role",
|
1608
1613
|
ttl="3600",
|
1609
1614
|
allow_ip_sans=True,
|
1610
1615
|
key_type="rsa",
|
@@ -1615,7 +1620,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1615
1620
|
],
|
1616
1621
|
allow_subdomains=True)
|
1617
1622
|
```
|
1618
|
-
<!--End PulumiCodeChooser -->
|
1619
1623
|
|
1620
1624
|
## Import
|
1621
1625
|
|
@@ -1666,13 +1670,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1666
1670
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1667
1671
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1668
1672
|
The value should not contain leading or trailing forward slashes.
|
1669
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1673
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1670
1674
|
*Available only for Vault Enterprise*.
|
1671
1675
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1672
1676
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1673
1677
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1674
1678
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1675
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1679
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1676
1680
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1677
1681
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1678
1682
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -1694,7 +1698,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1694
1698
|
|
1695
1699
|
## Example Usage
|
1696
1700
|
|
1697
|
-
<!--Start PulumiCodeChooser -->
|
1698
1701
|
```python
|
1699
1702
|
import pulumi
|
1700
1703
|
import pulumi_vault as vault
|
@@ -1706,6 +1709,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1706
1709
|
max_lease_ttl_seconds=86400)
|
1707
1710
|
role = vault.pki_secret.SecretBackendRole("role",
|
1708
1711
|
backend=pki.path,
|
1712
|
+
name="my_role",
|
1709
1713
|
ttl="3600",
|
1710
1714
|
allow_ip_sans=True,
|
1711
1715
|
key_type="rsa",
|
@@ -1716,7 +1720,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1716
1720
|
],
|
1717
1721
|
allow_subdomains=True)
|
1718
1722
|
```
|
1719
|
-
<!--End PulumiCodeChooser -->
|
1720
1723
|
|
1721
1724
|
## Import
|
1722
1725
|
|
@@ -1777,7 +1780,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1777
1780
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1778
1781
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1779
1782
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1780
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1783
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1781
1784
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1782
1785
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1783
1786
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1890,7 +1893,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1890
1893
|
not_before_duration: Optional[pulumi.Input[str]] = None,
|
1891
1894
|
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1892
1895
|
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1893
|
-
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1896
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
1894
1897
|
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1895
1898
|
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1896
1899
|
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -1946,13 +1949,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1946
1949
|
:param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
|
1947
1950
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1948
1951
|
The value should not contain leading or trailing forward slashes.
|
1949
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1952
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1950
1953
|
*Available only for Vault Enterprise*.
|
1951
1954
|
:param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
|
1952
1955
|
:param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
1953
1956
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
|
1954
1957
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
|
1955
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1958
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
1956
1959
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
1957
1960
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
|
1958
1961
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
|
@@ -2275,7 +2278,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
2275
2278
|
"""
|
2276
2279
|
The namespace to provision the resource in.
|
2277
2280
|
The value should not contain leading or trailing forward slashes.
|
2278
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
2281
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
2279
2282
|
*Available only for Vault Enterprise*.
|
2280
2283
|
"""
|
2281
2284
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
|
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
|
|
69
74
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
70
75
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
:param pulumi.Input[str] organization: The organization
|
75
80
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
|
|
352
357
|
"""
|
353
358
|
The namespace to provision the resource in.
|
354
359
|
The value should not contain leading or trailing forward slashes.
|
355
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
360
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
356
361
|
*Available only for Vault Enterprise*.
|
357
362
|
"""
|
358
363
|
return pulumi.get(self, "namespace")
|
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
|
|
513
518
|
postal_code: Optional[pulumi.Input[str]] = None,
|
514
519
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
515
520
|
province: Optional[pulumi.Input[str]] = None,
|
516
|
-
serial: Optional[pulumi.Input[str]] = None,
|
517
521
|
serial_number: Optional[pulumi.Input[str]] = None,
|
518
522
|
street_address: Optional[pulumi.Input[str]] = None,
|
519
523
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
|
|
548
552
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
549
553
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
550
554
|
The value should not contain leading or trailing forward slashes.
|
551
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
555
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
552
556
|
*Available only for Vault Enterprise*.
|
553
557
|
:param pulumi.Input[str] organization: The organization
|
554
558
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
|
|
557
561
|
:param pulumi.Input[str] postal_code: The postal code
|
558
562
|
:param pulumi.Input[str] private_key_format: The private key format
|
559
563
|
:param pulumi.Input[str] province: The province
|
560
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
561
564
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
562
565
|
:param pulumi.Input[str] street_address: The street address
|
563
566
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
|
|
621
624
|
pulumi.set(__self__, "private_key_format", private_key_format)
|
622
625
|
if province is not None:
|
623
626
|
pulumi.set(__self__, "province", province)
|
624
|
-
if serial is not None:
|
625
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
626
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
627
|
-
if serial is not None:
|
628
|
-
pulumi.set(__self__, "serial", serial)
|
629
627
|
if serial_number is not None:
|
630
628
|
pulumi.set(__self__, "serial_number", serial_number)
|
631
629
|
if street_address is not None:
|
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
|
|
888
886
|
"""
|
889
887
|
The namespace to provision the resource in.
|
890
888
|
The value should not contain leading or trailing forward slashes.
|
891
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
889
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
892
890
|
*Available only for Vault Enterprise*.
|
893
891
|
"""
|
894
892
|
return pulumi.get(self, "namespace")
|
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
|
|
981
979
|
def province(self, value: Optional[pulumi.Input[str]]):
|
982
980
|
pulumi.set(self, "province", value)
|
983
981
|
|
984
|
-
@property
|
985
|
-
@pulumi.getter
|
986
|
-
def serial(self) -> Optional[pulumi.Input[str]]:
|
987
|
-
"""
|
988
|
-
Deprecated, use `serial_number` instead.
|
989
|
-
"""
|
990
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
991
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
992
|
-
|
993
|
-
return pulumi.get(self, "serial")
|
994
|
-
|
995
|
-
@serial.setter
|
996
|
-
def serial(self, value: Optional[pulumi.Input[str]]):
|
997
|
-
pulumi.set(self, "serial", value)
|
998
|
-
|
999
982
|
@property
|
1000
983
|
@pulumi.getter(name="serialNumber")
|
1001
984
|
def serial_number(self) -> Optional[pulumi.Input[str]]:
|
@@ -1095,13 +1078,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1095
1078
|
"""
|
1096
1079
|
## Example Usage
|
1097
1080
|
|
1098
|
-
<!--Start PulumiCodeChooser -->
|
1099
1081
|
```python
|
1100
1082
|
import pulumi
|
1101
1083
|
import pulumi_vault as vault
|
1102
1084
|
|
1103
1085
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1104
|
-
backend=
|
1086
|
+
backend=pki["path"],
|
1105
1087
|
type="internal",
|
1106
1088
|
common_name="Root CA",
|
1107
1089
|
ttl="315360000",
|
@@ -1112,9 +1094,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1112
1094
|
exclude_cn_from_sans=True,
|
1113
1095
|
ou="My OU",
|
1114
1096
|
organization="My organization",
|
1115
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1097
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1116
1098
|
```
|
1117
|
-
<!--End PulumiCodeChooser -->
|
1118
1099
|
|
1119
1100
|
:param str resource_name: The name of the resource.
|
1120
1101
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1141,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1141
1122
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1142
1123
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1143
1124
|
The value should not contain leading or trailing forward slashes.
|
1144
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1125
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1145
1126
|
*Available only for Vault Enterprise*.
|
1146
1127
|
:param pulumi.Input[str] organization: The organization
|
1147
1128
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1165,13 +1146,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1165
1146
|
"""
|
1166
1147
|
## Example Usage
|
1167
1148
|
|
1168
|
-
<!--Start PulumiCodeChooser -->
|
1169
1149
|
```python
|
1170
1150
|
import pulumi
|
1171
1151
|
import pulumi_vault as vault
|
1172
1152
|
|
1173
1153
|
test = vault.pki_secret.SecretBackendRootCert("test",
|
1174
|
-
backend=
|
1154
|
+
backend=pki["path"],
|
1175
1155
|
type="internal",
|
1176
1156
|
common_name="Root CA",
|
1177
1157
|
ttl="315360000",
|
@@ -1182,9 +1162,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1182
1162
|
exclude_cn_from_sans=True,
|
1183
1163
|
ou="My OU",
|
1184
1164
|
organization="My organization",
|
1185
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1165
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1186
1166
|
```
|
1187
|
-
<!--End PulumiCodeChooser -->
|
1188
1167
|
|
1189
1168
|
:param str resource_name: The name of the resource.
|
1190
1169
|
:param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -1276,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1276
1255
|
__props__.__dict__["issuer_id"] = None
|
1277
1256
|
__props__.__dict__["issuing_ca"] = None
|
1278
1257
|
__props__.__dict__["key_id"] = None
|
1279
|
-
__props__.__dict__["serial"] = None
|
1280
1258
|
__props__.__dict__["serial_number"] = None
|
1281
1259
|
super(SecretBackendRootCert, __self__).__init__(
|
1282
1260
|
'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
|
@@ -1316,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1316
1294
|
postal_code: Optional[pulumi.Input[str]] = None,
|
1317
1295
|
private_key_format: Optional[pulumi.Input[str]] = None,
|
1318
1296
|
province: Optional[pulumi.Input[str]] = None,
|
1319
|
-
serial: Optional[pulumi.Input[str]] = None,
|
1320
1297
|
serial_number: Optional[pulumi.Input[str]] = None,
|
1321
1298
|
street_address: Optional[pulumi.Input[str]] = None,
|
1322
1299
|
ttl: Optional[pulumi.Input[str]] = None,
|
@@ -1356,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1356
1333
|
:param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
|
1357
1334
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1358
1335
|
The value should not contain leading or trailing forward slashes.
|
1359
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1336
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1360
1337
|
*Available only for Vault Enterprise*.
|
1361
1338
|
:param pulumi.Input[str] organization: The organization
|
1362
1339
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1365,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1365
1342
|
:param pulumi.Input[str] postal_code: The postal code
|
1366
1343
|
:param pulumi.Input[str] private_key_format: The private key format
|
1367
1344
|
:param pulumi.Input[str] province: The province
|
1368
|
-
:param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
|
1369
1345
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
1370
1346
|
:param pulumi.Input[str] street_address: The street address
|
1371
1347
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -1405,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1405
1381
|
__props__.__dict__["postal_code"] = postal_code
|
1406
1382
|
__props__.__dict__["private_key_format"] = private_key_format
|
1407
1383
|
__props__.__dict__["province"] = province
|
1408
|
-
__props__.__dict__["serial"] = serial
|
1409
1384
|
__props__.__dict__["serial_number"] = serial_number
|
1410
1385
|
__props__.__dict__["street_address"] = street_address
|
1411
1386
|
__props__.__dict__["ttl"] = ttl
|
@@ -1584,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1584
1559
|
"""
|
1585
1560
|
The namespace to provision the resource in.
|
1586
1561
|
The value should not contain leading or trailing forward slashes.
|
1587
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1588
1563
|
*Available only for Vault Enterprise*.
|
1589
1564
|
"""
|
1590
1565
|
return pulumi.get(self, "namespace")
|
@@ -1645,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
|
|
1645
1620
|
"""
|
1646
1621
|
return pulumi.get(self, "province")
|
1647
1622
|
|
1648
|
-
@property
|
1649
|
-
@pulumi.getter
|
1650
|
-
def serial(self) -> pulumi.Output[str]:
|
1651
|
-
"""
|
1652
|
-
Deprecated, use `serial_number` instead.
|
1653
|
-
"""
|
1654
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
1655
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
1656
|
-
|
1657
|
-
return pulumi.get(self, "serial")
|
1658
|
-
|
1659
1623
|
@property
|
1660
1624
|
@pulumi.getter(name="serialNumber")
|
1661
1625
|
def serial_number(self) -> pulumi.Output[str]:
|