pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,15 +4,53 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigEstAuthenticators',
|
13
19
|
'SecretBackendRolePolicyIdentifier',
|
20
|
+
'GetBackendConfigEstAuthenticatorResult',
|
14
21
|
]
|
15
22
|
|
23
|
+
@pulumi.output_type
|
24
|
+
class BackendConfigEstAuthenticators(dict):
|
25
|
+
def __init__(__self__, *,
|
26
|
+
cert: Optional[Mapping[str, str]] = None,
|
27
|
+
userpass: Optional[Mapping[str, str]] = None):
|
28
|
+
"""
|
29
|
+
:param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
30
|
+
:param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
|
31
|
+
"""
|
32
|
+
if cert is not None:
|
33
|
+
pulumi.set(__self__, "cert", cert)
|
34
|
+
if userpass is not None:
|
35
|
+
pulumi.set(__self__, "userpass", userpass)
|
36
|
+
|
37
|
+
@property
|
38
|
+
@pulumi.getter
|
39
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
40
|
+
"""
|
41
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
42
|
+
"""
|
43
|
+
return pulumi.get(self, "cert")
|
44
|
+
|
45
|
+
@property
|
46
|
+
@pulumi.getter
|
47
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
48
|
+
"""
|
49
|
+
"The accessor (required) property for user pass auth backends".
|
50
|
+
"""
|
51
|
+
return pulumi.get(self, "userpass")
|
52
|
+
|
53
|
+
|
16
54
|
@pulumi.output_type
|
17
55
|
class SecretBackendRolePolicyIdentifier(dict):
|
18
56
|
def __init__(__self__, *,
|
@@ -59,3 +97,34 @@ class SecretBackendRolePolicyIdentifier(dict):
|
|
59
97
|
return pulumi.get(self, "notice")
|
60
98
|
|
61
99
|
|
100
|
+
@pulumi.output_type
|
101
|
+
class GetBackendConfigEstAuthenticatorResult(dict):
|
102
|
+
def __init__(__self__, *,
|
103
|
+
cert: Optional[Mapping[str, str]] = None,
|
104
|
+
userpass: Optional[Mapping[str, str]] = None):
|
105
|
+
"""
|
106
|
+
:param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
|
107
|
+
:param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
|
108
|
+
"""
|
109
|
+
if cert is not None:
|
110
|
+
pulumi.set(__self__, "cert", cert)
|
111
|
+
if userpass is not None:
|
112
|
+
pulumi.set(__self__, "userpass", userpass)
|
113
|
+
|
114
|
+
@property
|
115
|
+
@pulumi.getter
|
116
|
+
def cert(self) -> Optional[Mapping[str, str]]:
|
117
|
+
"""
|
118
|
+
"The accessor and cert_role properties for cert auth backends".
|
119
|
+
"""
|
120
|
+
return pulumi.get(self, "cert")
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter
|
124
|
+
def userpass(self) -> Optional[Mapping[str, str]]:
|
125
|
+
"""
|
126
|
+
"The accessor property for user pass auth backends".
|
127
|
+
"""
|
128
|
+
return pulumi.get(self, "userpass")
|
129
|
+
|
130
|
+
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCertArgs', 'SecretBackendCert']
|
@@ -45,7 +50,7 @@ class SecretBackendCertArgs:
|
|
45
50
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
46
51
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
47
52
|
The value should not contain leading or trailing forward slashes.
|
48
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
53
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
54
|
*Available only for Vault Enterprise*.
|
50
55
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
51
56
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -213,7 +218,7 @@ class SecretBackendCertArgs:
|
|
213
218
|
"""
|
214
219
|
The namespace to provision the resource in.
|
215
220
|
The value should not contain leading or trailing forward slashes.
|
216
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
221
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
217
222
|
*Available only for Vault Enterprise*.
|
218
223
|
"""
|
219
224
|
return pulumi.get(self, "namespace")
|
@@ -341,7 +346,7 @@ class _SecretBackendCertState:
|
|
341
346
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
342
347
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
348
|
The value should not contain leading or trailing forward slashes.
|
344
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
349
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
350
|
*Available only for Vault Enterprise*.
|
346
351
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
347
352
|
:param pulumi.Input[str] private_key: The private key
|
@@ -579,7 +584,7 @@ class _SecretBackendCertState:
|
|
579
584
|
"""
|
580
585
|
The namespace to provision the resource in.
|
581
586
|
The value should not contain leading or trailing forward slashes.
|
582
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
583
588
|
*Available only for Vault Enterprise*.
|
584
589
|
"""
|
585
590
|
return pulumi.get(self, "namespace")
|
@@ -735,17 +740,16 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
735
740
|
"""
|
736
741
|
## Example Usage
|
737
742
|
|
738
|
-
<!--Start PulumiCodeChooser -->
|
739
743
|
```python
|
740
744
|
import pulumi
|
741
745
|
import pulumi_vault as vault
|
742
746
|
|
743
747
|
app = vault.pki_secret.SecretBackendCert("app",
|
744
|
-
backend=
|
748
|
+
backend=intermediate["path"],
|
749
|
+
name=test["name"],
|
745
750
|
common_name="app.my.domain",
|
746
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
751
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
747
752
|
```
|
748
|
-
<!--End PulumiCodeChooser -->
|
749
753
|
|
750
754
|
:param str resource_name: The name of the resource.
|
751
755
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -761,7 +765,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
761
765
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
762
766
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
763
767
|
The value should not contain leading or trailing forward slashes.
|
764
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
768
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
765
769
|
*Available only for Vault Enterprise*.
|
766
770
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
767
771
|
:param pulumi.Input[str] private_key_format: The private key format
|
@@ -779,17 +783,16 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
779
783
|
"""
|
780
784
|
## Example Usage
|
781
785
|
|
782
|
-
<!--Start PulumiCodeChooser -->
|
783
786
|
```python
|
784
787
|
import pulumi
|
785
788
|
import pulumi_vault as vault
|
786
789
|
|
787
790
|
app = vault.pki_secret.SecretBackendCert("app",
|
788
|
-
backend=
|
791
|
+
backend=intermediate["path"],
|
792
|
+
name=test["name"],
|
789
793
|
common_name="app.my.domain",
|
790
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
794
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
791
795
|
```
|
792
|
-
<!--End PulumiCodeChooser -->
|
793
796
|
|
794
797
|
:param str resource_name: The name of the resource.
|
795
798
|
:param SecretBackendCertArgs args: The arguments to use to populate this resource's properties.
|
@@ -921,7 +924,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
921
924
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
922
925
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
923
926
|
The value should not contain leading or trailing forward slashes.
|
924
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
927
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
925
928
|
*Available only for Vault Enterprise*.
|
926
929
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
927
930
|
:param pulumi.Input[str] private_key: The private key
|
@@ -1083,7 +1086,7 @@ class SecretBackendCert(pulumi.CustomResource):
|
|
1083
1086
|
"""
|
1084
1087
|
The namespace to provision the resource in.
|
1085
1088
|
The value should not contain leading or trailing forward slashes.
|
1086
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1089
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1087
1090
|
*Available only for Vault Enterprise*.
|
1088
1091
|
"""
|
1089
1092
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigCaArgs', 'SecretBackendConfigCa']
|
@@ -23,7 +28,7 @@ class SecretBackendConfigCaArgs:
|
|
23
28
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "backend", backend)
|
@@ -61,7 +66,7 @@ class SecretBackendConfigCaArgs:
|
|
61
66
|
"""
|
62
67
|
The namespace to provision the resource in.
|
63
68
|
The value should not contain leading or trailing forward slashes.
|
64
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
69
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
65
70
|
*Available only for Vault Enterprise*.
|
66
71
|
"""
|
67
72
|
return pulumi.get(self, "namespace")
|
@@ -82,7 +87,7 @@ class _SecretBackendConfigCaState:
|
|
82
87
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
83
88
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
88
93
|
"""
|
@@ -111,7 +116,7 @@ class _SecretBackendConfigCaState:
|
|
111
116
|
"""
|
112
117
|
The namespace to provision the resource in.
|
113
118
|
The value should not contain leading or trailing forward slashes.
|
114
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
119
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
120
|
*Available only for Vault Enterprise*.
|
116
121
|
"""
|
117
122
|
return pulumi.get(self, "namespace")
|
@@ -145,13 +150,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
145
150
|
"""
|
146
151
|
## Example Usage
|
147
152
|
|
148
|
-
<!--Start PulumiCodeChooser -->
|
149
153
|
```python
|
150
154
|
import pulumi
|
151
155
|
import pulumi_vault as vault
|
152
156
|
|
153
157
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
154
|
-
backend=
|
158
|
+
backend=intermediate_vault_mount["path"],
|
155
159
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
156
160
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
157
161
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -201,16 +205,15 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
201
205
|
MUR4qFxeUOW/GJGccMUd
|
202
206
|
-----END CERTIFICATE-----
|
203
207
|
\"\"\",
|
204
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
208
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
205
209
|
```
|
206
|
-
<!--End PulumiCodeChooser -->
|
207
210
|
|
208
211
|
:param str resource_name: The name of the resource.
|
209
212
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
210
213
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
211
214
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
212
215
|
The value should not contain leading or trailing forward slashes.
|
213
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
214
217
|
*Available only for Vault Enterprise*.
|
215
218
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
216
219
|
"""
|
@@ -223,13 +226,12 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
223
226
|
"""
|
224
227
|
## Example Usage
|
225
228
|
|
226
|
-
<!--Start PulumiCodeChooser -->
|
227
229
|
```python
|
228
230
|
import pulumi
|
229
231
|
import pulumi_vault as vault
|
230
232
|
|
231
233
|
intermediate = vault.pki_secret.SecretBackendConfigCa("intermediate",
|
232
|
-
backend=
|
234
|
+
backend=intermediate_vault_mount["path"],
|
233
235
|
pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----
|
234
236
|
MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/
|
235
237
|
5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o
|
@@ -279,9 +281,8 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
279
281
|
MUR4qFxeUOW/GJGccMUd
|
280
282
|
-----END CERTIFICATE-----
|
281
283
|
\"\"\",
|
282
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
284
|
+
opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
|
283
285
|
```
|
284
|
-
<!--End PulumiCodeChooser -->
|
285
286
|
|
286
287
|
:param str resource_name: The name of the resource.
|
287
288
|
:param SecretBackendConfigCaArgs args: The arguments to use to populate this resource's properties.
|
@@ -342,7 +343,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
342
343
|
:param pulumi.Input[str] backend: The PKI secret backend the resource belongs to.
|
343
344
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
344
345
|
The value should not contain leading or trailing forward slashes.
|
345
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
346
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
346
347
|
*Available only for Vault Enterprise*.
|
347
348
|
:param pulumi.Input[str] pem_bundle: The key and certificate PEM bundle
|
348
349
|
"""
|
@@ -369,7 +370,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
|
|
369
370
|
"""
|
370
371
|
The namespace to provision the resource in.
|
371
372
|
The value should not contain leading or trailing forward slashes.
|
372
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
373
374
|
*Available only for Vault Enterprise*.
|
374
375
|
"""
|
375
376
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigIssuersArgs', 'SecretBackendConfigIssuers']
|
@@ -27,7 +32,7 @@ class SecretBackendConfigIssuersArgs:
|
|
27
32
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
28
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
34
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
36
|
*Available only for Vault Enterprise*.
|
32
37
|
"""
|
33
38
|
pulumi.set(__self__, "backend", backend)
|
@@ -82,7 +87,7 @@ class SecretBackendConfigIssuersArgs:
|
|
82
87
|
"""
|
83
88
|
The namespace to provision the resource in.
|
84
89
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
90
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
91
|
*Available only for Vault Enterprise*.
|
87
92
|
"""
|
88
93
|
return pulumi.get(self, "namespace")
|
@@ -108,7 +113,7 @@ class _SecretBackendConfigIssuersState:
|
|
108
113
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
109
114
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
110
115
|
The value should not contain leading or trailing forward slashes.
|
111
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
116
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
112
117
|
*Available only for Vault Enterprise*.
|
113
118
|
"""
|
114
119
|
if backend is not None:
|
@@ -164,7 +169,7 @@ class _SecretBackendConfigIssuersState:
|
|
164
169
|
"""
|
165
170
|
The namespace to provision the resource in.
|
166
171
|
The value should not contain leading or trailing forward slashes.
|
167
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
172
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
168
173
|
*Available only for Vault Enterprise*.
|
169
174
|
"""
|
170
175
|
return pulumi.get(self, "namespace")
|
@@ -187,7 +192,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
187
192
|
"""
|
188
193
|
## Example Usage
|
189
194
|
|
190
|
-
<!--Start PulumiCodeChooser -->
|
191
195
|
```python
|
192
196
|
import pulumi
|
193
197
|
import pulumi_vault as vault
|
@@ -211,7 +215,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
211
215
|
default=example.issuer_id,
|
212
216
|
default_follows_latest_issuer=True)
|
213
217
|
```
|
214
|
-
<!--End PulumiCodeChooser -->
|
215
218
|
|
216
219
|
## Import
|
217
220
|
|
@@ -230,7 +233,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
230
233
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
231
234
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
232
235
|
The value should not contain leading or trailing forward slashes.
|
233
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
236
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
234
237
|
*Available only for Vault Enterprise*.
|
235
238
|
"""
|
236
239
|
...
|
@@ -242,7 +245,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
242
245
|
"""
|
243
246
|
## Example Usage
|
244
247
|
|
245
|
-
<!--Start PulumiCodeChooser -->
|
246
248
|
```python
|
247
249
|
import pulumi
|
248
250
|
import pulumi_vault as vault
|
@@ -266,7 +268,6 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
266
268
|
default=example.issuer_id,
|
267
269
|
default_follows_latest_issuer=True)
|
268
270
|
```
|
269
|
-
<!--End PulumiCodeChooser -->
|
270
271
|
|
271
272
|
## Import
|
272
273
|
|
@@ -338,7 +339,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
338
339
|
or an issuer import operation updates the default issuer to the newly added issuer.
|
339
340
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
340
341
|
The value should not contain leading or trailing forward slashes.
|
341
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
342
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
342
343
|
*Available only for Vault Enterprise*.
|
343
344
|
"""
|
344
345
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -383,7 +384,7 @@ class SecretBackendConfigIssuers(pulumi.CustomResource):
|
|
383
384
|
"""
|
384
385
|
The namespace to provision the resource in.
|
385
386
|
The value should not contain leading or trailing forward slashes.
|
386
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
387
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
387
388
|
*Available only for Vault Enterprise*.
|
388
389
|
"""
|
389
390
|
return pulumi.get(self, "namespace")
|