pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|
@@ -16,6 +21,7 @@ class SecretBackendConfigUrlsArgs:
|
|
16
21
|
def __init__(__self__, *,
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
19
25
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
21
27
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -23,16 +29,19 @@ class SecretBackendConfigUrlsArgs:
|
|
23
29
|
The set of arguments for constructing a SecretBackendConfigUrls resource.
|
24
30
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
25
31
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
32
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
26
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
27
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
35
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
37
|
*Available only for Vault Enterprise*.
|
31
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
32
39
|
"""
|
33
40
|
pulumi.set(__self__, "backend", backend)
|
34
41
|
if crl_distribution_points is not None:
|
35
42
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
43
|
+
if enable_templating is not None:
|
44
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
36
45
|
if issuing_certificates is not None:
|
37
46
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
38
47
|
if namespace is not None:
|
@@ -64,6 +73,18 @@ class SecretBackendConfigUrlsArgs:
|
|
64
73
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
65
74
|
pulumi.set(self, "crl_distribution_points", value)
|
66
75
|
|
76
|
+
@property
|
77
|
+
@pulumi.getter(name="enableTemplating")
|
78
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
79
|
+
"""
|
80
|
+
Specifies that templating of AIA fields is allowed.
|
81
|
+
"""
|
82
|
+
return pulumi.get(self, "enable_templating")
|
83
|
+
|
84
|
+
@enable_templating.setter
|
85
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
86
|
+
pulumi.set(self, "enable_templating", value)
|
87
|
+
|
67
88
|
@property
|
68
89
|
@pulumi.getter(name="issuingCertificates")
|
69
90
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -82,7 +103,7 @@ class SecretBackendConfigUrlsArgs:
|
|
82
103
|
"""
|
83
104
|
The namespace to provision the resource in.
|
84
105
|
The value should not contain leading or trailing forward slashes.
|
85
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
106
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
86
107
|
*Available only for Vault Enterprise*.
|
87
108
|
"""
|
88
109
|
return pulumi.get(self, "namespace")
|
@@ -109,6 +130,7 @@ class _SecretBackendConfigUrlsState:
|
|
109
130
|
def __init__(__self__, *,
|
110
131
|
backend: Optional[pulumi.Input[str]] = None,
|
111
132
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
133
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
112
134
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
113
135
|
namespace: Optional[pulumi.Input[str]] = None,
|
114
136
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -116,10 +138,11 @@ class _SecretBackendConfigUrlsState:
|
|
116
138
|
Input properties used for looking up and filtering SecretBackendConfigUrls resources.
|
117
139
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
118
140
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
141
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
119
142
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
120
143
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
144
|
The value should not contain leading or trailing forward slashes.
|
122
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
145
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
123
146
|
*Available only for Vault Enterprise*.
|
124
147
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
125
148
|
"""
|
@@ -127,6 +150,8 @@ class _SecretBackendConfigUrlsState:
|
|
127
150
|
pulumi.set(__self__, "backend", backend)
|
128
151
|
if crl_distribution_points is not None:
|
129
152
|
pulumi.set(__self__, "crl_distribution_points", crl_distribution_points)
|
153
|
+
if enable_templating is not None:
|
154
|
+
pulumi.set(__self__, "enable_templating", enable_templating)
|
130
155
|
if issuing_certificates is not None:
|
131
156
|
pulumi.set(__self__, "issuing_certificates", issuing_certificates)
|
132
157
|
if namespace is not None:
|
@@ -158,6 +183,18 @@ class _SecretBackendConfigUrlsState:
|
|
158
183
|
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
159
184
|
pulumi.set(self, "crl_distribution_points", value)
|
160
185
|
|
186
|
+
@property
|
187
|
+
@pulumi.getter(name="enableTemplating")
|
188
|
+
def enable_templating(self) -> Optional[pulumi.Input[bool]]:
|
189
|
+
"""
|
190
|
+
Specifies that templating of AIA fields is allowed.
|
191
|
+
"""
|
192
|
+
return pulumi.get(self, "enable_templating")
|
193
|
+
|
194
|
+
@enable_templating.setter
|
195
|
+
def enable_templating(self, value: Optional[pulumi.Input[bool]]):
|
196
|
+
pulumi.set(self, "enable_templating", value)
|
197
|
+
|
161
198
|
@property
|
162
199
|
@pulumi.getter(name="issuingCertificates")
|
163
200
|
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -176,7 +213,7 @@ class _SecretBackendConfigUrlsState:
|
|
176
213
|
"""
|
177
214
|
The namespace to provision the resource in.
|
178
215
|
The value should not contain leading or trailing forward slashes.
|
179
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
180
217
|
*Available only for Vault Enterprise*.
|
181
218
|
"""
|
182
219
|
return pulumi.get(self, "namespace")
|
@@ -205,6 +242,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
205
242
|
opts: Optional[pulumi.ResourceOptions] = None,
|
206
243
|
backend: Optional[pulumi.Input[str]] = None,
|
207
244
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
245
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
208
246
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
209
247
|
namespace: Optional[pulumi.Input[str]] = None,
|
210
248
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -214,7 +252,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
214
252
|
|
215
253
|
## Example Usage
|
216
254
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
255
|
```python
|
219
256
|
import pulumi
|
220
257
|
import pulumi_vault as vault
|
@@ -229,7 +266,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
229
266
|
backend=root.path,
|
230
267
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
231
268
|
```
|
232
|
-
<!--End PulumiCodeChooser -->
|
233
269
|
|
234
270
|
## Import
|
235
271
|
|
@@ -245,10 +281,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
245
281
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
246
282
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
247
283
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
284
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
248
285
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
249
286
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
250
287
|
The value should not contain leading or trailing forward slashes.
|
251
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
288
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
252
289
|
*Available only for Vault Enterprise*.
|
253
290
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
254
291
|
"""
|
@@ -263,7 +300,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
263
300
|
|
264
301
|
## Example Usage
|
265
302
|
|
266
|
-
<!--Start PulumiCodeChooser -->
|
267
303
|
```python
|
268
304
|
import pulumi
|
269
305
|
import pulumi_vault as vault
|
@@ -278,7 +314,6 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
278
314
|
backend=root.path,
|
279
315
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
280
316
|
```
|
281
|
-
<!--End PulumiCodeChooser -->
|
282
317
|
|
283
318
|
## Import
|
284
319
|
|
@@ -307,6 +342,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
307
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
308
343
|
backend: Optional[pulumi.Input[str]] = None,
|
309
344
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
345
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
310
346
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
347
|
namespace: Optional[pulumi.Input[str]] = None,
|
312
348
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -323,6 +359,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
323
359
|
raise TypeError("Missing required property 'backend'")
|
324
360
|
__props__.__dict__["backend"] = backend
|
325
361
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
362
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
326
363
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
327
364
|
__props__.__dict__["namespace"] = namespace
|
328
365
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -338,6 +375,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
338
375
|
opts: Optional[pulumi.ResourceOptions] = None,
|
339
376
|
backend: Optional[pulumi.Input[str]] = None,
|
340
377
|
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
378
|
+
enable_templating: Optional[pulumi.Input[bool]] = None,
|
341
379
|
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
342
380
|
namespace: Optional[pulumi.Input[str]] = None,
|
343
381
|
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendConfigUrls':
|
@@ -350,10 +388,11 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
350
388
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
351
389
|
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
352
390
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
391
|
+
:param pulumi.Input[bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
353
392
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
354
393
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
355
394
|
The value should not contain leading or trailing forward slashes.
|
356
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
395
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
357
396
|
*Available only for Vault Enterprise*.
|
358
397
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
359
398
|
"""
|
@@ -363,6 +402,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
363
402
|
|
364
403
|
__props__.__dict__["backend"] = backend
|
365
404
|
__props__.__dict__["crl_distribution_points"] = crl_distribution_points
|
405
|
+
__props__.__dict__["enable_templating"] = enable_templating
|
366
406
|
__props__.__dict__["issuing_certificates"] = issuing_certificates
|
367
407
|
__props__.__dict__["namespace"] = namespace
|
368
408
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
@@ -384,6 +424,14 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
384
424
|
"""
|
385
425
|
return pulumi.get(self, "crl_distribution_points")
|
386
426
|
|
427
|
+
@property
|
428
|
+
@pulumi.getter(name="enableTemplating")
|
429
|
+
def enable_templating(self) -> pulumi.Output[Optional[bool]]:
|
430
|
+
"""
|
431
|
+
Specifies that templating of AIA fields is allowed.
|
432
|
+
"""
|
433
|
+
return pulumi.get(self, "enable_templating")
|
434
|
+
|
387
435
|
@property
|
388
436
|
@pulumi.getter(name="issuingCertificates")
|
389
437
|
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -398,7 +446,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
398
446
|
"""
|
399
447
|
The namespace to provision the resource in.
|
400
448
|
The value should not contain leading or trailing forward slashes.
|
401
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
449
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
402
450
|
*Available only for Vault Enterprise*.
|
403
451
|
"""
|
404
452
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
|
@@ -40,7 +45,7 @@ class SecretBackendCrlConfigArgs:
|
|
40
45
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
41
46
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
42
47
|
The value should not contain leading or trailing forward slashes.
|
43
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
48
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
49
|
*Available only for Vault Enterprise*.
|
45
50
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
46
51
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -178,7 +183,7 @@ class SecretBackendCrlConfigArgs:
|
|
178
183
|
"""
|
179
184
|
The namespace to provision the resource in.
|
180
185
|
The value should not contain leading or trailing forward slashes.
|
181
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
186
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
182
187
|
*Available only for Vault Enterprise*.
|
183
188
|
"""
|
184
189
|
return pulumi.get(self, "namespace")
|
@@ -267,7 +272,7 @@ class _SecretBackendCrlConfigState:
|
|
267
272
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
268
273
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
269
274
|
The value should not contain leading or trailing forward slashes.
|
270
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
275
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
276
|
*Available only for Vault Enterprise*.
|
272
277
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
273
278
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -406,7 +411,7 @@ class _SecretBackendCrlConfigState:
|
|
406
411
|
"""
|
407
412
|
The namespace to provision the resource in.
|
408
413
|
The value should not contain leading or trailing forward slashes.
|
409
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
414
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
410
415
|
*Available only for Vault Enterprise*.
|
411
416
|
"""
|
412
417
|
return pulumi.get(self, "namespace")
|
@@ -490,7 +495,6 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
490
495
|
|
491
496
|
## Example Usage
|
492
497
|
|
493
|
-
<!--Start PulumiCodeChooser -->
|
494
498
|
```python
|
495
499
|
import pulumi
|
496
500
|
import pulumi_vault as vault
|
@@ -500,12 +504,11 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
500
504
|
type="pki",
|
501
505
|
default_lease_ttl_seconds=3600,
|
502
506
|
max_lease_ttl_seconds=86400)
|
503
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
507
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
504
508
|
backend=pki.path,
|
505
509
|
expiry="72h",
|
506
510
|
disable=False)
|
507
511
|
```
|
508
|
-
<!--End PulumiCodeChooser -->
|
509
512
|
|
510
513
|
:param str resource_name: The name of the resource.
|
511
514
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -520,7 +523,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
520
523
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
521
524
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
522
525
|
The value should not contain leading or trailing forward slashes.
|
523
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
526
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
524
527
|
*Available only for Vault Enterprise*.
|
525
528
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
526
529
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -540,7 +543,6 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
540
543
|
|
541
544
|
## Example Usage
|
542
545
|
|
543
|
-
<!--Start PulumiCodeChooser -->
|
544
546
|
```python
|
545
547
|
import pulumi
|
546
548
|
import pulumi_vault as vault
|
@@ -550,12 +552,11 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
550
552
|
type="pki",
|
551
553
|
default_lease_ttl_seconds=3600,
|
552
554
|
max_lease_ttl_seconds=86400)
|
553
|
-
crl_config = vault.pki_secret.SecretBackendCrlConfig("
|
555
|
+
crl_config = vault.pki_secret.SecretBackendCrlConfig("crl_config",
|
554
556
|
backend=pki.path,
|
555
557
|
expiry="72h",
|
556
558
|
disable=False)
|
557
559
|
```
|
558
|
-
<!--End PulumiCodeChooser -->
|
559
560
|
|
560
561
|
:param str resource_name: The name of the resource.
|
561
562
|
:param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
|
@@ -650,7 +651,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
650
651
|
:param pulumi.Input[str] expiry: Specifies the time until expiration.
|
651
652
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
652
653
|
The value should not contain leading or trailing forward slashes.
|
653
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
654
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
654
655
|
*Available only for Vault Enterprise*.
|
655
656
|
:param pulumi.Input[bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
656
657
|
:param pulumi.Input[str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
@@ -749,7 +750,7 @@ class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
749
750
|
"""
|
750
751
|
The namespace to provision the resource in.
|
751
752
|
The value should not contain leading or trailing forward slashes.
|
752
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
753
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
753
754
|
*Available only for Vault Enterprise*.
|
754
755
|
"""
|
755
756
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateCertRequestArgs', 'SecretBackendIntermediateCertRequest']
|
@@ -66,7 +71,7 @@ class SecretBackendIntermediateCertRequestArgs:
|
|
66
71
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
67
72
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
68
73
|
The value should not contain leading or trailing forward slashes.
|
69
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
74
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
70
75
|
*Available only for Vault Enterprise*.
|
71
76
|
:param pulumi.Input[str] organization: The organization
|
72
77
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -330,7 +335,7 @@ class SecretBackendIntermediateCertRequestArgs:
|
|
330
335
|
"""
|
331
336
|
The namespace to provision the resource in.
|
332
337
|
The value should not contain leading or trailing forward slashes.
|
333
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
338
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
334
339
|
*Available only for Vault Enterprise*.
|
335
340
|
"""
|
336
341
|
return pulumi.get(self, "namespace")
|
@@ -495,7 +500,7 @@ class _SecretBackendIntermediateCertRequestState:
|
|
495
500
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
496
501
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
497
502
|
The value should not contain leading or trailing forward slashes.
|
498
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
503
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
499
504
|
*Available only for Vault Enterprise*.
|
500
505
|
:param pulumi.Input[str] organization: The organization
|
501
506
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -785,7 +790,7 @@ class _SecretBackendIntermediateCertRequestState:
|
|
785
790
|
"""
|
786
791
|
The namespace to provision the resource in.
|
787
792
|
The value should not contain leading or trailing forward slashes.
|
788
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
793
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
789
794
|
*Available only for Vault Enterprise*.
|
790
795
|
"""
|
791
796
|
return pulumi.get(self, "namespace")
|
@@ -962,18 +967,16 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
962
967
|
"""
|
963
968
|
## Example Usage
|
964
969
|
|
965
|
-
<!--Start PulumiCodeChooser -->
|
966
970
|
```python
|
967
971
|
import pulumi
|
968
972
|
import pulumi_vault as vault
|
969
973
|
|
970
974
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
971
|
-
backend=
|
975
|
+
backend=pki["path"],
|
972
976
|
type="internal",
|
973
977
|
common_name="app.my.domain",
|
974
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
978
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
975
979
|
```
|
976
|
-
<!--End PulumiCodeChooser -->
|
977
980
|
|
978
981
|
:param str resource_name: The name of the resource.
|
979
982
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1000,7 +1003,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1000
1003
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
1001
1004
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1002
1005
|
The value should not contain leading or trailing forward slashes.
|
1003
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1006
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1004
1007
|
*Available only for Vault Enterprise*.
|
1005
1008
|
:param pulumi.Input[str] organization: The organization
|
1006
1009
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1022,18 +1025,16 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1022
1025
|
"""
|
1023
1026
|
## Example Usage
|
1024
1027
|
|
1025
|
-
<!--Start PulumiCodeChooser -->
|
1026
1028
|
```python
|
1027
1029
|
import pulumi
|
1028
1030
|
import pulumi_vault as vault
|
1029
1031
|
|
1030
1032
|
test = vault.pki_secret.SecretBackendIntermediateCertRequest("test",
|
1031
|
-
backend=
|
1033
|
+
backend=pki["path"],
|
1032
1034
|
type="internal",
|
1033
1035
|
common_name="app.my.domain",
|
1034
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
1036
|
+
opts = pulumi.ResourceOptions(depends_on=[pki]))
|
1035
1037
|
```
|
1036
|
-
<!--End PulumiCodeChooser -->
|
1037
1038
|
|
1038
1039
|
:param str resource_name: The name of the resource.
|
1039
1040
|
:param SecretBackendIntermediateCertRequestArgs args: The arguments to use to populate this resource's properties.
|
@@ -1192,7 +1193,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1192
1193
|
required if `type` is `kms` and it conflicts with `managed_key_id`
|
1193
1194
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1194
1195
|
The value should not contain leading or trailing forward slashes.
|
1195
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1196
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1196
1197
|
*Available only for Vault Enterprise*.
|
1197
1198
|
:param pulumi.Input[str] organization: The organization
|
1198
1199
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
@@ -1390,7 +1391,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
|
|
1390
1391
|
"""
|
1391
1392
|
The namespace to provision the resource in.
|
1392
1393
|
The value should not contain leading or trailing forward slashes.
|
1393
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1394
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1394
1395
|
*Available only for Vault Enterprise*.
|
1395
1396
|
"""
|
1396
1397
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
|
@@ -25,7 +30,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
25
30
|
issue and sign operations.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "backend", backend)
|
@@ -65,7 +70,7 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
65
70
|
"""
|
66
71
|
The namespace to provision the resource in.
|
67
72
|
The value should not contain leading or trailing forward slashes.
|
68
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
73
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
69
74
|
*Available only for Vault Enterprise*.
|
70
75
|
"""
|
71
76
|
return pulumi.get(self, "namespace")
|
@@ -94,7 +99,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
94
99
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
95
100
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
96
101
|
The value should not contain leading or trailing forward slashes.
|
97
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
102
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
98
103
|
*Available only for Vault Enterprise*.
|
99
104
|
"""
|
100
105
|
if backend is not None:
|
@@ -165,7 +170,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
165
170
|
"""
|
166
171
|
The namespace to provision the resource in.
|
167
172
|
The value should not contain leading or trailing forward slashes.
|
168
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
173
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
169
174
|
*Available only for Vault Enterprise*.
|
170
175
|
"""
|
171
176
|
return pulumi.get(self, "namespace")
|
@@ -187,7 +192,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
187
192
|
"""
|
188
193
|
## Example Usage
|
189
194
|
|
190
|
-
<!--Start PulumiCodeChooser -->
|
191
195
|
```python
|
192
196
|
import pulumi
|
193
197
|
import pulumi_vault as vault
|
@@ -204,7 +208,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
204
208
|
description="intermediate",
|
205
209
|
default_lease_ttl_seconds=86400,
|
206
210
|
max_lease_ttl_seconds=86400)
|
207
|
-
|
211
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
208
212
|
backend=root.path,
|
209
213
|
type="internal",
|
210
214
|
common_name="RootOrg Root CA",
|
@@ -219,11 +223,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
219
223
|
country="US",
|
220
224
|
locality="San Francisco",
|
221
225
|
province="CA")
|
222
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
226
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
223
227
|
backend=intermediate.path,
|
224
|
-
type=
|
228
|
+
type=example.type,
|
225
229
|
common_name="SubOrg Intermediate CA")
|
226
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
230
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
227
231
|
backend=root.path,
|
228
232
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
229
233
|
common_name="SubOrg Intermediate CA",
|
@@ -234,11 +238,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
234
238
|
locality="San Francisco",
|
235
239
|
province="CA",
|
236
240
|
revoke=True)
|
237
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
241
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
238
242
|
backend=intermediate.path,
|
239
243
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
240
244
|
```
|
241
|
-
<!--End PulumiCodeChooser -->
|
242
245
|
|
243
246
|
:param str resource_name: The name of the resource.
|
244
247
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -248,7 +251,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
248
251
|
issue and sign operations.
|
249
252
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
250
253
|
The value should not contain leading or trailing forward slashes.
|
251
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
254
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
252
255
|
*Available only for Vault Enterprise*.
|
253
256
|
"""
|
254
257
|
...
|
@@ -260,7 +263,6 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
260
263
|
"""
|
261
264
|
## Example Usage
|
262
265
|
|
263
|
-
<!--Start PulumiCodeChooser -->
|
264
266
|
```python
|
265
267
|
import pulumi
|
266
268
|
import pulumi_vault as vault
|
@@ -277,7 +279,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
277
279
|
description="intermediate",
|
278
280
|
default_lease_ttl_seconds=86400,
|
279
281
|
max_lease_ttl_seconds=86400)
|
280
|
-
|
282
|
+
example = vault.pki_secret.SecretBackendRootCert("example",
|
281
283
|
backend=root.path,
|
282
284
|
type="internal",
|
283
285
|
common_name="RootOrg Root CA",
|
@@ -292,11 +294,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
292
294
|
country="US",
|
293
295
|
locality="San Francisco",
|
294
296
|
province="CA")
|
295
|
-
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("
|
297
|
+
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
|
296
298
|
backend=intermediate.path,
|
297
|
-
type=
|
299
|
+
type=example.type,
|
298
300
|
common_name="SubOrg Intermediate CA")
|
299
|
-
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("
|
301
|
+
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
|
300
302
|
backend=root.path,
|
301
303
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
302
304
|
common_name="SubOrg Intermediate CA",
|
@@ -307,11 +309,10 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
307
309
|
locality="San Francisco",
|
308
310
|
province="CA",
|
309
311
|
revoke=True)
|
310
|
-
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("
|
312
|
+
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
|
311
313
|
backend=intermediate.path,
|
312
314
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
313
315
|
```
|
314
|
-
<!--End PulumiCodeChooser -->
|
315
316
|
|
316
317
|
:param str resource_name: The name of the resource.
|
317
318
|
:param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
|
@@ -380,7 +381,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
380
381
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
381
382
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
382
383
|
The value should not contain leading or trailing forward slashes.
|
383
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
384
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
384
385
|
*Available only for Vault Enterprise*.
|
385
386
|
"""
|
386
387
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -435,7 +436,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
435
436
|
"""
|
436
437
|
The namespace to provision the resource in.
|
437
438
|
The value should not contain leading or trailing forward slashes.
|
438
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
439
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
439
440
|
*Available only for Vault Enterprise*.
|
440
441
|
"""
|
441
442
|
return pulumi.get(self, "namespace")
|