pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
16
21
  def __init__(__self__, *,
17
22
  backend: pulumi.Input[str],
18
23
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
+ enable_templating: Optional[pulumi.Input[bool]] = None,
19
25
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
20
26
  namespace: Optional[pulumi.Input[str]] = None,
21
27
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
23
29
  The set of arguments for constructing a SecretBackendConfigUrls resource.
24
30
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
25
31
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
32
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
26
33
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
27
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
35
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
37
  *Available only for Vault Enterprise*.
31
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
32
39
  """
33
40
  pulumi.set(__self__, "backend", backend)
34
41
  if crl_distribution_points is not None:
35
42
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
43
+ if enable_templating is not None:
44
+ pulumi.set(__self__, "enable_templating", enable_templating)
36
45
  if issuing_certificates is not None:
37
46
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
38
47
  if namespace is not None:
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
64
73
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
65
74
  pulumi.set(self, "crl_distribution_points", value)
66
75
 
76
+ @property
77
+ @pulumi.getter(name="enableTemplating")
78
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
79
+ """
80
+ Specifies that templating of AIA fields is allowed.
81
+ """
82
+ return pulumi.get(self, "enable_templating")
83
+
84
+ @enable_templating.setter
85
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
86
+ pulumi.set(self, "enable_templating", value)
87
+
67
88
  @property
68
89
  @pulumi.getter(name="issuingCertificates")
69
90
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
82
103
  """
83
104
  The namespace to provision the resource in.
84
105
  The value should not contain leading or trailing forward slashes.
85
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
106
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
86
107
  *Available only for Vault Enterprise*.
87
108
  """
88
109
  return pulumi.get(self, "namespace")
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
109
130
  def __init__(__self__, *,
110
131
  backend: Optional[pulumi.Input[str]] = None,
111
132
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
133
+ enable_templating: Optional[pulumi.Input[bool]] = None,
112
134
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
113
135
  namespace: Optional[pulumi.Input[str]] = None,
114
136
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
116
138
  Input properties used for looking up and filtering SecretBackendConfigUrls resources.
117
139
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
118
140
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
141
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
119
142
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
120
143
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
144
  The value should not contain leading or trailing forward slashes.
122
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
145
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
146
  *Available only for Vault Enterprise*.
124
147
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
125
148
  """
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
127
150
  pulumi.set(__self__, "backend", backend)
128
151
  if crl_distribution_points is not None:
129
152
  pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
153
+ if enable_templating is not None:
154
+ pulumi.set(__self__, "enable_templating", enable_templating)
130
155
  if issuing_certificates is not None:
131
156
  pulumi.set(__self__, "issuing_certificates", issuing_certificates)
132
157
  if namespace is not None:
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
158
183
  def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
159
184
  pulumi.set(self, "crl_distribution_points", value)
160
185
 
186
+ @property
187
+ @pulumi.getter(name="enableTemplating")
188
+ def enable_templating(self) -> Optional[pulumi.Input[bool]]:
189
+ """
190
+ Specifies that templating of AIA fields is allowed.
191
+ """
192
+ return pulumi.get(self, "enable_templating")
193
+
194
+ @enable_templating.setter
195
+ def enable_templating(self, value: Optional[pulumi.Input[bool]]):
196
+ pulumi.set(self, "enable_templating", value)
197
+
161
198
  @property
162
199
  @pulumi.getter(name="issuingCertificates")
163
200
  def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
176
213
  """
177
214
  The namespace to provision the resource in.
178
215
  The value should not contain leading or trailing forward slashes.
179
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
217
  *Available only for Vault Enterprise*.
181
218
  """
182
219
  return pulumi.get(self, "namespace")
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
205
242
  opts: Optional[pulumi.ResourceOptions] = None,
206
243
  backend: Optional[pulumi.Input[str]] = None,
207
244
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
245
+ enable_templating: Optional[pulumi.Input[bool]] = None,
208
246
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
209
247
  namespace: Optional[pulumi.Input[str]] = None,
210
248
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -214,7 +252,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
214
252
 
215
253
  ## Example Usage
216
254
 
217
- <!--Start PulumiCodeChooser -->
218
255
  ```python
219
256
  import pulumi
220
257
  import pulumi_vault as vault
@@ -229,7 +266,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
229
266
  backend=root.path,
230
267
  issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
231
268
  ```
232
- <!--End PulumiCodeChooser -->
233
269
 
234
270
  ## Import
235
271
 
@@ -245,10 +281,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
245
281
  :param pulumi.ResourceOptions opts: Options for the resource.
246
282
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
247
283
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
284
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
248
285
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
249
286
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
250
287
  The value should not contain leading or trailing forward slashes.
251
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
288
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
252
289
  *Available only for Vault Enterprise*.
253
290
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
254
291
  """
@@ -263,7 +300,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
263
300
 
264
301
  ## Example Usage
265
302
 
266
- <!--Start PulumiCodeChooser -->
267
303
  ```python
268
304
  import pulumi
269
305
  import pulumi_vault as vault
@@ -278,7 +314,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
278
314
  backend=root.path,
279
315
  issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
280
316
  ```
281
- <!--End PulumiCodeChooser -->
282
317
 
283
318
  ## Import
284
319
 
@@ -307,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
307
342
  opts: Optional[pulumi.ResourceOptions] = None,
308
343
  backend: Optional[pulumi.Input[str]] = None,
309
344
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
345
+ enable_templating: Optional[pulumi.Input[bool]] = None,
310
346
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
347
  namespace: Optional[pulumi.Input[str]] = None,
312
348
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -323,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
323
359
  raise TypeError("Missing required property 'backend'")
324
360
  __props__.__dict__["backend"] = backend
325
361
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
362
+ __props__.__dict__["enable_templating"] = enable_templating
326
363
  __props__.__dict__["issuing_certificates"] = issuing_certificates
327
364
  __props__.__dict__["namespace"] = namespace
328
365
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -338,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
338
375
  opts: Optional[pulumi.ResourceOptions] = None,
339
376
  backend: Optional[pulumi.Input[str]] = None,
340
377
  crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
378
+ enable_templating: Optional[pulumi.Input[bool]] = None,
341
379
  issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
342
380
  namespace: Optional[pulumi.Input[str]] = None,
343
381
  ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
@@ -350,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
350
388
  :param pulumi.ResourceOptions opts: Options for the resource.
351
389
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
352
390
  :param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
391
+ :param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
353
392
  :param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
354
393
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
355
394
  The value should not contain leading or trailing forward slashes.
356
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
395
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
357
396
  *Available only for Vault Enterprise*.
358
397
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
359
398
  """
@@ -363,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
363
402
 
364
403
  __props__.__dict__["backend"] = backend
365
404
  __props__.__dict__["crl_distribution_points"] = crl_distribution_points
405
+ __props__.__dict__["enable_templating"] = enable_templating
366
406
  __props__.__dict__["issuing_certificates"] = issuing_certificates
367
407
  __props__.__dict__["namespace"] = namespace
368
408
  __props__.__dict__["ocsp_servers"] = ocsp_servers
@@ -384,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
384
424
  """
385
425
  return pulumi.get(self, "crl_distribution_points")
386
426
 
427
+ @property
428
+ @pulumi.getter(name="enableTemplating")
429
+ def enable_templating(self) -> pulumi.Output[Optional[bool]]:
430
+ """
431
+ Specifies that templating of AIA fields is allowed.
432
+ """
433
+ return pulumi.get(self, "enable_templating")
434
+
387
435
  @property
388
436
  @pulumi.getter(name="issuingCertificates")
389
437
  def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -398,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
398
446
  """
399
447
  The namespace to provision the resource in.
400
448
  The value should not contain leading or trailing forward slashes.
401
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
449
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
402
450
  *Available only for Vault Enterprise*.
403
451
  """
404
452
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
@@ -40,7 +45,7 @@ class SecretBackendCrlConfigArgs:
40
45
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
41
46
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
42
47
  The value should not contain leading or trailing forward slashes.
43
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
48
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
49
  *Available only for Vault Enterprise*.
45
50
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
46
51
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -178,7 +183,7 @@ class SecretBackendCrlConfigArgs:
178
183
  """
179
184
  The namespace to provision the resource in.
180
185
  The value should not contain leading or trailing forward slashes.
181
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
186
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
182
187
  *Available only for Vault Enterprise*.
183
188
  """
184
189
  return pulumi.get(self, "namespace")
@@ -267,7 +272,7 @@ class _SecretBackendCrlConfigState:
267
272
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
268
273
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
269
274
  The value should not contain leading or trailing forward slashes.
270
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
275
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
276
  *Available only for Vault Enterprise*.
272
277
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
273
278
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -406,7 +411,7 @@ class _SecretBackendCrlConfigState:
406
411
  """
407
412
  The namespace to provision the resource in.
408
413
  The value should not contain leading or trailing forward slashes.
409
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
414
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
410
415
  *Available only for Vault Enterprise*.
411
416
  """
412
417
  return pulumi.get(self, "namespace")
@@ -490,7 +495,6 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
490
495
 
491
496
  ## Example Usage
492
497
 
493
- <!--Start PulumiCodeChooser -->
494
498
  ```python
495
499
  import pulumi
496
500
  import pulumi_vault as vault
@@ -500,12 +504,11 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
500
504
  type="pki",
501
505
  default_lease_ttl_seconds=3600,
502
506
  max_lease_ttl_seconds=86400)
503
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
507
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
504
508
  backend=pki.path,
505
509
  expiry="72h",
506
510
  disable=False)
507
511
  ```
508
- <!--End PulumiCodeChooser -->
509
512
 
510
513
  :param str resource_name: The name of the resource.
511
514
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -520,7 +523,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
520
523
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
521
524
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
522
525
  The value should not contain leading or trailing forward slashes.
523
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
526
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
524
527
  *Available only for Vault Enterprise*.
525
528
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
526
529
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -540,7 +543,6 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
540
543
 
541
544
  ## Example Usage
542
545
 
543
- <!--Start PulumiCodeChooser -->
544
546
  ```python
545
547
  import pulumi
546
548
  import pulumi_vault as vault
@@ -550,12 +552,11 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
550
552
  type="pki",
551
553
  default_lease_ttl_seconds=3600,
552
554
  max_lease_ttl_seconds=86400)
553
- crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
555
+ crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
554
556
  backend=pki.path,
555
557
  expiry="72h",
556
558
  disable=False)
557
559
  ```
558
- <!--End PulumiCodeChooser -->
559
560
 
560
561
  :param str resource_name: The name of the resource.
561
562
  :param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
@@ -650,7 +651,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
650
651
  :param pulumi.Input[str] expiry: Specifies the time until expiration.
651
652
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
652
653
  The value should not contain leading or trailing forward slashes.
653
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
654
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
654
655
  *Available only for Vault Enterprise*.
655
656
  :param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
656
657
  :param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
@@ -749,7 +750,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
749
750
  """
750
751
  The namespace to provision the resource in.
751
752
  The value should not contain leading or trailing forward slashes.
752
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
753
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
753
754
  *Available only for Vault Enterprise*.
754
755
  """
755
756
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
@@ -66,7 +71,7 @@ class SecretBackendIntermediateCertRequestArgs:
66
71
  required if `type` is `kms` and it conflicts with `managed_key_id`
67
72
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
68
73
  The value should not contain leading or trailing forward slashes.
69
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
74
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
70
75
  *Available only for Vault Enterprise*.
71
76
  :param pulumi.Input[str] organization: The organization
72
77
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -330,7 +335,7 @@ class SecretBackendIntermediateCertRequestArgs:
330
335
  """
331
336
  The namespace to provision the resource in.
332
337
  The value should not contain leading or trailing forward slashes.
333
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
338
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
334
339
  *Available only for Vault Enterprise*.
335
340
  """
336
341
  return pulumi.get(self, "namespace")
@@ -495,7 +500,7 @@ class _SecretBackendIntermediateCertRequestState:
495
500
  required if `type` is `kms` and it conflicts with `managed_key_id`
496
501
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
497
502
  The value should not contain leading or trailing forward slashes.
498
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
503
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
499
504
  *Available only for Vault Enterprise*.
500
505
  :param pulumi.Input[str] organization: The organization
501
506
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -785,7 +790,7 @@ class _SecretBackendIntermediateCertRequestState:
785
790
  """
786
791
  The namespace to provision the resource in.
787
792
  The value should not contain leading or trailing forward slashes.
788
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
793
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
789
794
  *Available only for Vault Enterprise*.
790
795
  """
791
796
  return pulumi.get(self, "namespace")
@@ -962,18 +967,16 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
962
967
  """
963
968
  ## Example Usage
964
969
 
965
- <!--Start PulumiCodeChooser -->
966
970
  ```python
967
971
  import pulumi
968
972
  import pulumi_vault as vault
969
973
 
970
974
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
971
- backend=vault_mount["pki"]["path"],
975
+ backend=pki["path"],
972
976
  type="internal",
973
977
  common_name="app.my.domain",
974
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
978
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
975
979
  ```
976
- <!--End PulumiCodeChooser -->
977
980
 
978
981
  :param str resource_name: The name of the resource.
979
982
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1000,7 +1003,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1000
1003
  required if `type` is `kms` and it conflicts with `managed_key_id`
1001
1004
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1002
1005
  The value should not contain leading or trailing forward slashes.
1003
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1006
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1004
1007
  *Available only for Vault Enterprise*.
1005
1008
  :param pulumi.Input[str] organization: The organization
1006
1009
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1022,18 +1025,16 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1022
1025
  """
1023
1026
  ## Example Usage
1024
1027
 
1025
- <!--Start PulumiCodeChooser -->
1026
1028
  ```python
1027
1029
  import pulumi
1028
1030
  import pulumi_vault as vault
1029
1031
 
1030
1032
  test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
1031
- backend=vault_mount["pki"]["path"],
1033
+ backend=pki["path"],
1032
1034
  type="internal",
1033
1035
  common_name="app.my.domain",
1034
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1036
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1035
1037
  ```
1036
- <!--End PulumiCodeChooser -->
1037
1038
 
1038
1039
  :param str resource_name: The name of the resource.
1039
1040
  :param SecretBackendIntermediateCertRequestArgs args: The arguments to use to populate this resource's properties.
@@ -1192,7 +1193,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1192
1193
  required if `type` is `kms` and it conflicts with `managed_key_id`
1193
1194
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1194
1195
  The value should not contain leading or trailing forward slashes.
1195
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1196
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1196
1197
  *Available only for Vault Enterprise*.
1197
1198
  :param pulumi.Input[str] organization: The organization
1198
1199
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1390,7 +1391,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1390
1391
  """
1391
1392
  The namespace to provision the resource in.
1392
1393
  The value should not contain leading or trailing forward slashes.
1393
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1394
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1394
1395
  *Available only for Vault Enterprise*.
1395
1396
  """
1396
1397
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
@@ -25,7 +30,7 @@ class SecretBackendIntermediateSetSignedArgs:
25
30
  issue and sign operations.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  pulumi.set(__self__, "backend", backend)
@@ -65,7 +70,7 @@ class SecretBackendIntermediateSetSignedArgs:
65
70
  """
66
71
  The namespace to provision the resource in.
67
72
  The value should not contain leading or trailing forward slashes.
68
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
73
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
69
74
  *Available only for Vault Enterprise*.
70
75
  """
71
76
  return pulumi.get(self, "namespace")
@@ -94,7 +99,7 @@ class _SecretBackendIntermediateSetSignedState:
94
99
  :param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
95
100
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
96
101
  The value should not contain leading or trailing forward slashes.
97
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
102
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
98
103
  *Available only for Vault Enterprise*.
99
104
  """
100
105
  if backend is not None:
@@ -165,7 +170,7 @@ class _SecretBackendIntermediateSetSignedState:
165
170
  """
166
171
  The namespace to provision the resource in.
167
172
  The value should not contain leading or trailing forward slashes.
168
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
173
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
169
174
  *Available only for Vault Enterprise*.
170
175
  """
171
176
  return pulumi.get(self, "namespace")
@@ -187,7 +192,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
187
192
  """
188
193
  ## Example Usage
189
194
 
190
- <!--Start PulumiCodeChooser -->
191
195
  ```python
192
196
  import pulumi
193
197
  import pulumi_vault as vault
@@ -204,7 +208,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
204
208
  description="intermediate",
205
209
  default_lease_ttl_seconds=86400,
206
210
  max_lease_ttl_seconds=86400)
207
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
211
+ example = vault.pki_secret.SecretBackendRootCert("example",
208
212
  backend=root.path,
209
213
  type="internal",
210
214
  common_name="RootOrg Root CA",
@@ -219,11 +223,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
219
223
  country="US",
220
224
  locality="San Francisco",
221
225
  province="CA")
222
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
226
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
223
227
  backend=intermediate.path,
224
- type=example_secret_backend_root_cert.type,
228
+ type=example.type,
225
229
  common_name="SubOrg Intermediate CA")
226
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
230
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
227
231
  backend=root.path,
228
232
  csr=example_secret_backend_intermediate_cert_request.csr,
229
233
  common_name="SubOrg Intermediate CA",
@@ -234,11 +238,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
234
238
  locality="San Francisco",
235
239
  province="CA",
236
240
  revoke=True)
237
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
241
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
238
242
  backend=intermediate.path,
239
243
  certificate=example_secret_backend_root_sign_intermediate.certificate)
240
244
  ```
241
- <!--End PulumiCodeChooser -->
242
245
 
243
246
  :param str resource_name: The name of the resource.
244
247
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -248,7 +251,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
248
251
  issue and sign operations.
249
252
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
250
253
  The value should not contain leading or trailing forward slashes.
251
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
254
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
252
255
  *Available only for Vault Enterprise*.
253
256
  """
254
257
  ...
@@ -260,7 +263,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
260
263
  """
261
264
  ## Example Usage
262
265
 
263
- <!--Start PulumiCodeChooser -->
264
266
  ```python
265
267
  import pulumi
266
268
  import pulumi_vault as vault
@@ -277,7 +279,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
277
279
  description="intermediate",
278
280
  default_lease_ttl_seconds=86400,
279
281
  max_lease_ttl_seconds=86400)
280
- example_secret_backend_root_cert = vault.pki_secret.SecretBackendRootCert("exampleSecretBackendRootCert",
282
+ example = vault.pki_secret.SecretBackendRootCert("example",
281
283
  backend=root.path,
282
284
  type="internal",
283
285
  common_name="RootOrg Root CA",
@@ -292,11 +294,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
292
294
  country="US",
293
295
  locality="San Francisco",
294
296
  province="CA")
295
- example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest",
297
+ example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
296
298
  backend=intermediate.path,
297
- type=example_secret_backend_root_cert.type,
299
+ type=example.type,
298
300
  common_name="SubOrg Intermediate CA")
299
- example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate",
301
+ example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
300
302
  backend=root.path,
301
303
  csr=example_secret_backend_intermediate_cert_request.csr,
302
304
  common_name="SubOrg Intermediate CA",
@@ -307,11 +309,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
307
309
  locality="San Francisco",
308
310
  province="CA",
309
311
  revoke=True)
310
- example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned",
312
+ example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
311
313
  backend=intermediate.path,
312
314
  certificate=example_secret_backend_root_sign_intermediate.certificate)
313
315
  ```
314
- <!--End PulumiCodeChooser -->
315
316
 
316
317
  :param str resource_name: The name of the resource.
317
318
  :param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
@@ -380,7 +381,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
380
381
  :param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
381
382
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
382
383
  The value should not contain leading or trailing forward slashes.
383
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
384
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
384
385
  *Available only for Vault Enterprise*.
385
386
  """
386
387
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -435,7 +436,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
435
436
  """
436
437
  The namespace to provision the resource in.
437
438
  The value should not contain leading or trailing forward slashes.
438
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
439
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
439
440
  *Available only for Vault Enterprise*.
440
441
  """
441
442
  return pulumi.get(self, "namespace")