pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,61 +20,61 @@ __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretBackendIssuerArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
issuer_ref: pulumi.Input[str],
|
24
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
disable_critical_extension_checks: Optional[pulumi.Input[bool]] = None,
|
26
|
-
disable_name_checks: Optional[pulumi.Input[bool]] = None,
|
27
|
-
disable_name_constraint_checks: Optional[pulumi.Input[bool]] = None,
|
28
|
-
disable_path_length_checks: Optional[pulumi.Input[bool]] = None,
|
29
|
-
enable_aia_url_templating: Optional[pulumi.Input[bool]] = None,
|
30
|
-
issuer_name: Optional[pulumi.Input[str]] = None,
|
31
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
-
leaf_not_after_behavior: Optional[pulumi.Input[str]] = None,
|
33
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
34
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
35
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
|
-
revocation_signature_algorithm: Optional[pulumi.Input[str]] = None,
|
37
|
-
usage: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
issuer_ref: pulumi.Input[builtins.str],
|
25
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
disable_critical_extension_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
disable_name_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
28
|
+
disable_name_constraint_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
29
|
+
disable_path_length_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
30
|
+
enable_aia_url_templating: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
issuer_name: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
33
|
+
leaf_not_after_behavior: Optional[pulumi.Input[builtins.str]] = None,
|
34
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
35
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
36
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
37
|
+
revocation_signature_algorithm: Optional[pulumi.Input[builtins.str]] = None,
|
38
|
+
usage: Optional[pulumi.Input[builtins.str]] = None):
|
38
39
|
"""
|
39
40
|
The set of arguments for constructing a SecretBackendIssuer resource.
|
40
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no
|
41
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
41
42
|
leading or trailing `/`s.
|
42
|
-
:param pulumi.Input[str] issuer_ref: Reference to an existing issuer.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL
|
43
|
+
:param pulumi.Input[builtins.str] issuer_ref: Reference to an existing issuer.
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
44
45
|
Distribution Points field.
|
45
|
-
:param pulumi.Input[bool] disable_critical_extension_checks: This determines whether this
|
46
|
+
:param pulumi.Input[builtins.bool] disable_critical_extension_checks: This determines whether this
|
46
47
|
issuer is able to issue certificates where the chain of trust (including the
|
47
48
|
issued certificate) contain critical extensions not processed by Vault.
|
48
|
-
:param pulumi.Input[bool] disable_name_checks: This determines whether this issuer is able
|
49
|
+
:param pulumi.Input[builtins.bool] disable_name_checks: This determines whether this issuer is able
|
49
50
|
to issue certificates where the chain of trust (including the final issued
|
50
51
|
certificate) contains a link in which the subject of the issuing certificate
|
51
52
|
does not match the named issuer of the certificate it signed.
|
52
|
-
:param pulumi.Input[bool] disable_name_constraint_checks: This determines whether this
|
53
|
+
:param pulumi.Input[builtins.bool] disable_name_constraint_checks: This determines whether this
|
53
54
|
issuer is able to issue certificates where the chain of trust (including the
|
54
55
|
final issued certificate) violates the name constraints critical extension of
|
55
56
|
one of the issuer certificates in the chain.
|
56
|
-
:param pulumi.Input[bool] disable_path_length_checks: This determines whether this issuer
|
57
|
+
:param pulumi.Input[builtins.bool] disable_path_length_checks: This determines whether this issuer
|
57
58
|
is able to issue certificates where the chain of trust (including the final
|
58
59
|
issued certificate) is longer than allowed by a certificate authority in that
|
59
60
|
chain.
|
60
|
-
:param pulumi.Input[bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
61
|
+
:param pulumi.Input[builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
61
62
|
be templated.
|
62
|
-
:param pulumi.Input[str] issuer_name: Name of the issuer.
|
63
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing
|
63
|
+
:param pulumi.Input[builtins.str] issuer_name: Name of the issuer.
|
64
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
64
65
|
Certificate field.
|
65
|
-
:param pulumi.Input[str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
66
|
+
:param pulumi.Input[builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
66
67
|
issuance.
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] manual_chains: Chain of issuer references to build this issuer's
|
68
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
68
69
|
computed CAChain field from, when non-empty.
|
69
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
70
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
70
71
|
The value should not contain leading or trailing forward slashes.
|
71
72
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
72
73
|
*Available only for Vault Enterprise*.
|
73
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
74
|
-
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
74
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
75
|
+
:param pulumi.Input[builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
75
76
|
when building CRLs.
|
76
|
-
:param pulumi.Input[str] usage: Allowed usages for this issuer.
|
77
|
+
:param pulumi.Input[builtins.str] usage: Allowed usages for this issuer.
|
77
78
|
"""
|
78
79
|
pulumi.set(__self__, "backend", backend)
|
79
80
|
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
@@ -108,7 +109,7 @@ class SecretBackendIssuerArgs:
|
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter
|
111
|
-
def backend(self) -> pulumi.Input[str]:
|
112
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
112
113
|
"""
|
113
114
|
The path the PKI secret backend is mounted at, with no
|
114
115
|
leading or trailing `/`s.
|
@@ -116,24 +117,24 @@ class SecretBackendIssuerArgs:
|
|
116
117
|
return pulumi.get(self, "backend")
|
117
118
|
|
118
119
|
@backend.setter
|
119
|
-
def backend(self, value: pulumi.Input[str]):
|
120
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
120
121
|
pulumi.set(self, "backend", value)
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter(name="issuerRef")
|
124
|
-
def issuer_ref(self) -> pulumi.Input[str]:
|
125
|
+
def issuer_ref(self) -> pulumi.Input[builtins.str]:
|
125
126
|
"""
|
126
127
|
Reference to an existing issuer.
|
127
128
|
"""
|
128
129
|
return pulumi.get(self, "issuer_ref")
|
129
130
|
|
130
131
|
@issuer_ref.setter
|
131
|
-
def issuer_ref(self, value: pulumi.Input[str]):
|
132
|
+
def issuer_ref(self, value: pulumi.Input[builtins.str]):
|
132
133
|
pulumi.set(self, "issuer_ref", value)
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter(name="crlDistributionPoints")
|
136
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
137
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
137
138
|
"""
|
138
139
|
Specifies the URL values for the CRL
|
139
140
|
Distribution Points field.
|
@@ -141,12 +142,12 @@ class SecretBackendIssuerArgs:
|
|
141
142
|
return pulumi.get(self, "crl_distribution_points")
|
142
143
|
|
143
144
|
@crl_distribution_points.setter
|
144
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
145
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
145
146
|
pulumi.set(self, "crl_distribution_points", value)
|
146
147
|
|
147
148
|
@property
|
148
149
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
149
|
-
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[bool]]:
|
150
|
+
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
150
151
|
"""
|
151
152
|
This determines whether this
|
152
153
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -155,12 +156,12 @@ class SecretBackendIssuerArgs:
|
|
155
156
|
return pulumi.get(self, "disable_critical_extension_checks")
|
156
157
|
|
157
158
|
@disable_critical_extension_checks.setter
|
158
|
-
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[bool]]):
|
159
|
+
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
159
160
|
pulumi.set(self, "disable_critical_extension_checks", value)
|
160
161
|
|
161
162
|
@property
|
162
163
|
@pulumi.getter(name="disableNameChecks")
|
163
|
-
def disable_name_checks(self) -> Optional[pulumi.Input[bool]]:
|
164
|
+
def disable_name_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
164
165
|
"""
|
165
166
|
This determines whether this issuer is able
|
166
167
|
to issue certificates where the chain of trust (including the final issued
|
@@ -170,12 +171,12 @@ class SecretBackendIssuerArgs:
|
|
170
171
|
return pulumi.get(self, "disable_name_checks")
|
171
172
|
|
172
173
|
@disable_name_checks.setter
|
173
|
-
def disable_name_checks(self, value: Optional[pulumi.Input[bool]]):
|
174
|
+
def disable_name_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
174
175
|
pulumi.set(self, "disable_name_checks", value)
|
175
176
|
|
176
177
|
@property
|
177
178
|
@pulumi.getter(name="disableNameConstraintChecks")
|
178
|
-
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[bool]]:
|
179
|
+
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
179
180
|
"""
|
180
181
|
This determines whether this
|
181
182
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -185,12 +186,12 @@ class SecretBackendIssuerArgs:
|
|
185
186
|
return pulumi.get(self, "disable_name_constraint_checks")
|
186
187
|
|
187
188
|
@disable_name_constraint_checks.setter
|
188
|
-
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[bool]]):
|
189
|
+
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
189
190
|
pulumi.set(self, "disable_name_constraint_checks", value)
|
190
191
|
|
191
192
|
@property
|
192
193
|
@pulumi.getter(name="disablePathLengthChecks")
|
193
|
-
def disable_path_length_checks(self) -> Optional[pulumi.Input[bool]]:
|
194
|
+
def disable_path_length_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
194
195
|
"""
|
195
196
|
This determines whether this issuer
|
196
197
|
is able to issue certificates where the chain of trust (including the final
|
@@ -200,12 +201,12 @@ class SecretBackendIssuerArgs:
|
|
200
201
|
return pulumi.get(self, "disable_path_length_checks")
|
201
202
|
|
202
203
|
@disable_path_length_checks.setter
|
203
|
-
def disable_path_length_checks(self, value: Optional[pulumi.Input[bool]]):
|
204
|
+
def disable_path_length_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
204
205
|
pulumi.set(self, "disable_path_length_checks", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
208
|
-
def enable_aia_url_templating(self) -> Optional[pulumi.Input[bool]]:
|
209
|
+
def enable_aia_url_templating(self) -> Optional[pulumi.Input[builtins.bool]]:
|
209
210
|
"""
|
210
211
|
Specifies that the AIA URL values should
|
211
212
|
be templated.
|
@@ -213,24 +214,24 @@ class SecretBackendIssuerArgs:
|
|
213
214
|
return pulumi.get(self, "enable_aia_url_templating")
|
214
215
|
|
215
216
|
@enable_aia_url_templating.setter
|
216
|
-
def enable_aia_url_templating(self, value: Optional[pulumi.Input[bool]]):
|
217
|
+
def enable_aia_url_templating(self, value: Optional[pulumi.Input[builtins.bool]]):
|
217
218
|
pulumi.set(self, "enable_aia_url_templating", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="issuerName")
|
221
|
-
def issuer_name(self) -> Optional[pulumi.Input[str]]:
|
222
|
+
def issuer_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
222
223
|
"""
|
223
224
|
Name of the issuer.
|
224
225
|
"""
|
225
226
|
return pulumi.get(self, "issuer_name")
|
226
227
|
|
227
228
|
@issuer_name.setter
|
228
|
-
def issuer_name(self, value: Optional[pulumi.Input[str]]):
|
229
|
+
def issuer_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
229
230
|
pulumi.set(self, "issuer_name", value)
|
230
231
|
|
231
232
|
@property
|
232
233
|
@pulumi.getter(name="issuingCertificates")
|
233
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
234
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
234
235
|
"""
|
235
236
|
Specifies the URL values for the Issuing
|
236
237
|
Certificate field.
|
@@ -238,12 +239,12 @@ class SecretBackendIssuerArgs:
|
|
238
239
|
return pulumi.get(self, "issuing_certificates")
|
239
240
|
|
240
241
|
@issuing_certificates.setter
|
241
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
242
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
242
243
|
pulumi.set(self, "issuing_certificates", value)
|
243
244
|
|
244
245
|
@property
|
245
246
|
@pulumi.getter(name="leafNotAfterBehavior")
|
246
|
-
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[str]]:
|
247
|
+
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[builtins.str]]:
|
247
248
|
"""
|
248
249
|
Behavior of a leaf's NotAfter field during
|
249
250
|
issuance.
|
@@ -251,12 +252,12 @@ class SecretBackendIssuerArgs:
|
|
251
252
|
return pulumi.get(self, "leaf_not_after_behavior")
|
252
253
|
|
253
254
|
@leaf_not_after_behavior.setter
|
254
|
-
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[str]]):
|
255
|
+
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[builtins.str]]):
|
255
256
|
pulumi.set(self, "leaf_not_after_behavior", value)
|
256
257
|
|
257
258
|
@property
|
258
259
|
@pulumi.getter(name="manualChains")
|
259
|
-
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
260
|
+
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
260
261
|
"""
|
261
262
|
Chain of issuer references to build this issuer's
|
262
263
|
computed CAChain field from, when non-empty.
|
@@ -264,12 +265,12 @@ class SecretBackendIssuerArgs:
|
|
264
265
|
return pulumi.get(self, "manual_chains")
|
265
266
|
|
266
267
|
@manual_chains.setter
|
267
|
-
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
268
|
+
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
268
269
|
pulumi.set(self, "manual_chains", value)
|
269
270
|
|
270
271
|
@property
|
271
272
|
@pulumi.getter
|
272
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
273
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
273
274
|
"""
|
274
275
|
The namespace to provision the resource in.
|
275
276
|
The value should not contain leading or trailing forward slashes.
|
@@ -279,24 +280,24 @@ class SecretBackendIssuerArgs:
|
|
279
280
|
return pulumi.get(self, "namespace")
|
280
281
|
|
281
282
|
@namespace.setter
|
282
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
283
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
283
284
|
pulumi.set(self, "namespace", value)
|
284
285
|
|
285
286
|
@property
|
286
287
|
@pulumi.getter(name="ocspServers")
|
287
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
288
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
288
289
|
"""
|
289
290
|
Specifies the URL values for the OCSP Servers field.
|
290
291
|
"""
|
291
292
|
return pulumi.get(self, "ocsp_servers")
|
292
293
|
|
293
294
|
@ocsp_servers.setter
|
294
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
295
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
295
296
|
pulumi.set(self, "ocsp_servers", value)
|
296
297
|
|
297
298
|
@property
|
298
299
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
299
|
-
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[str]]:
|
300
|
+
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
|
300
301
|
"""
|
301
302
|
Which signature algorithm to use
|
302
303
|
when building CRLs.
|
@@ -304,82 +305,82 @@ class SecretBackendIssuerArgs:
|
|
304
305
|
return pulumi.get(self, "revocation_signature_algorithm")
|
305
306
|
|
306
307
|
@revocation_signature_algorithm.setter
|
307
|
-
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[str]]):
|
308
|
+
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
|
308
309
|
pulumi.set(self, "revocation_signature_algorithm", value)
|
309
310
|
|
310
311
|
@property
|
311
312
|
@pulumi.getter
|
312
|
-
def usage(self) -> Optional[pulumi.Input[str]]:
|
313
|
+
def usage(self) -> Optional[pulumi.Input[builtins.str]]:
|
313
314
|
"""
|
314
315
|
Allowed usages for this issuer.
|
315
316
|
"""
|
316
317
|
return pulumi.get(self, "usage")
|
317
318
|
|
318
319
|
@usage.setter
|
319
|
-
def usage(self, value: Optional[pulumi.Input[str]]):
|
320
|
+
def usage(self, value: Optional[pulumi.Input[builtins.str]]):
|
320
321
|
pulumi.set(self, "usage", value)
|
321
322
|
|
322
323
|
|
323
324
|
@pulumi.input_type
|
324
325
|
class _SecretBackendIssuerState:
|
325
326
|
def __init__(__self__, *,
|
326
|
-
backend: Optional[pulumi.Input[str]] = None,
|
327
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
328
|
-
disable_critical_extension_checks: Optional[pulumi.Input[bool]] = None,
|
329
|
-
disable_name_checks: Optional[pulumi.Input[bool]] = None,
|
330
|
-
disable_name_constraint_checks: Optional[pulumi.Input[bool]] = None,
|
331
|
-
disable_path_length_checks: Optional[pulumi.Input[bool]] = None,
|
332
|
-
enable_aia_url_templating: Optional[pulumi.Input[bool]] = None,
|
333
|
-
issuer_id: Optional[pulumi.Input[str]] = None,
|
334
|
-
issuer_name: Optional[pulumi.Input[str]] = None,
|
335
|
-
issuer_ref: Optional[pulumi.Input[str]] = None,
|
336
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
337
|
-
leaf_not_after_behavior: Optional[pulumi.Input[str]] = None,
|
338
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
339
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
340
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
341
|
-
revocation_signature_algorithm: Optional[pulumi.Input[str]] = None,
|
342
|
-
usage: Optional[pulumi.Input[str]] = None):
|
327
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
328
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
329
|
+
disable_critical_extension_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
330
|
+
disable_name_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
331
|
+
disable_name_constraint_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
332
|
+
disable_path_length_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
333
|
+
enable_aia_url_templating: Optional[pulumi.Input[builtins.bool]] = None,
|
334
|
+
issuer_id: Optional[pulumi.Input[builtins.str]] = None,
|
335
|
+
issuer_name: Optional[pulumi.Input[builtins.str]] = None,
|
336
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
337
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
338
|
+
leaf_not_after_behavior: Optional[pulumi.Input[builtins.str]] = None,
|
339
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
340
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
341
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
342
|
+
revocation_signature_algorithm: Optional[pulumi.Input[builtins.str]] = None,
|
343
|
+
usage: Optional[pulumi.Input[builtins.str]] = None):
|
343
344
|
"""
|
344
345
|
Input properties used for looking up and filtering SecretBackendIssuer resources.
|
345
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no
|
346
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
346
347
|
leading or trailing `/`s.
|
347
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL
|
348
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
348
349
|
Distribution Points field.
|
349
|
-
:param pulumi.Input[bool] disable_critical_extension_checks: This determines whether this
|
350
|
+
:param pulumi.Input[builtins.bool] disable_critical_extension_checks: This determines whether this
|
350
351
|
issuer is able to issue certificates where the chain of trust (including the
|
351
352
|
issued certificate) contain critical extensions not processed by Vault.
|
352
|
-
:param pulumi.Input[bool] disable_name_checks: This determines whether this issuer is able
|
353
|
+
:param pulumi.Input[builtins.bool] disable_name_checks: This determines whether this issuer is able
|
353
354
|
to issue certificates where the chain of trust (including the final issued
|
354
355
|
certificate) contains a link in which the subject of the issuing certificate
|
355
356
|
does not match the named issuer of the certificate it signed.
|
356
|
-
:param pulumi.Input[bool] disable_name_constraint_checks: This determines whether this
|
357
|
+
:param pulumi.Input[builtins.bool] disable_name_constraint_checks: This determines whether this
|
357
358
|
issuer is able to issue certificates where the chain of trust (including the
|
358
359
|
final issued certificate) violates the name constraints critical extension of
|
359
360
|
one of the issuer certificates in the chain.
|
360
|
-
:param pulumi.Input[bool] disable_path_length_checks: This determines whether this issuer
|
361
|
+
:param pulumi.Input[builtins.bool] disable_path_length_checks: This determines whether this issuer
|
361
362
|
is able to issue certificates where the chain of trust (including the final
|
362
363
|
issued certificate) is longer than allowed by a certificate authority in that
|
363
364
|
chain.
|
364
|
-
:param pulumi.Input[bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
365
|
+
:param pulumi.Input[builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
365
366
|
be templated.
|
366
|
-
:param pulumi.Input[str] issuer_id: ID of the issuer.
|
367
|
-
:param pulumi.Input[str] issuer_name: Name of the issuer.
|
368
|
-
:param pulumi.Input[str] issuer_ref: Reference to an existing issuer.
|
369
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing
|
367
|
+
:param pulumi.Input[builtins.str] issuer_id: ID of the issuer.
|
368
|
+
:param pulumi.Input[builtins.str] issuer_name: Name of the issuer.
|
369
|
+
:param pulumi.Input[builtins.str] issuer_ref: Reference to an existing issuer.
|
370
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
370
371
|
Certificate field.
|
371
|
-
:param pulumi.Input[str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
372
|
+
:param pulumi.Input[builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
372
373
|
issuance.
|
373
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] manual_chains: Chain of issuer references to build this issuer's
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
374
375
|
computed CAChain field from, when non-empty.
|
375
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
376
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
376
377
|
The value should not contain leading or trailing forward slashes.
|
377
378
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
378
379
|
*Available only for Vault Enterprise*.
|
379
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
380
|
-
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
380
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
381
|
+
:param pulumi.Input[builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
381
382
|
when building CRLs.
|
382
|
-
:param pulumi.Input[str] usage: Allowed usages for this issuer.
|
383
|
+
:param pulumi.Input[builtins.str] usage: Allowed usages for this issuer.
|
383
384
|
"""
|
384
385
|
if backend is not None:
|
385
386
|
pulumi.set(__self__, "backend", backend)
|
@@ -418,7 +419,7 @@ class _SecretBackendIssuerState:
|
|
418
419
|
|
419
420
|
@property
|
420
421
|
@pulumi.getter
|
421
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
422
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
422
423
|
"""
|
423
424
|
The path the PKI secret backend is mounted at, with no
|
424
425
|
leading or trailing `/`s.
|
@@ -426,12 +427,12 @@ class _SecretBackendIssuerState:
|
|
426
427
|
return pulumi.get(self, "backend")
|
427
428
|
|
428
429
|
@backend.setter
|
429
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
430
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
430
431
|
pulumi.set(self, "backend", value)
|
431
432
|
|
432
433
|
@property
|
433
434
|
@pulumi.getter(name="crlDistributionPoints")
|
434
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
435
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
435
436
|
"""
|
436
437
|
Specifies the URL values for the CRL
|
437
438
|
Distribution Points field.
|
@@ -439,12 +440,12 @@ class _SecretBackendIssuerState:
|
|
439
440
|
return pulumi.get(self, "crl_distribution_points")
|
440
441
|
|
441
442
|
@crl_distribution_points.setter
|
442
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
443
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
443
444
|
pulumi.set(self, "crl_distribution_points", value)
|
444
445
|
|
445
446
|
@property
|
446
447
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
447
|
-
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[bool]]:
|
448
|
+
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
448
449
|
"""
|
449
450
|
This determines whether this
|
450
451
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -453,12 +454,12 @@ class _SecretBackendIssuerState:
|
|
453
454
|
return pulumi.get(self, "disable_critical_extension_checks")
|
454
455
|
|
455
456
|
@disable_critical_extension_checks.setter
|
456
|
-
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[bool]]):
|
457
|
+
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
457
458
|
pulumi.set(self, "disable_critical_extension_checks", value)
|
458
459
|
|
459
460
|
@property
|
460
461
|
@pulumi.getter(name="disableNameChecks")
|
461
|
-
def disable_name_checks(self) -> Optional[pulumi.Input[bool]]:
|
462
|
+
def disable_name_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
462
463
|
"""
|
463
464
|
This determines whether this issuer is able
|
464
465
|
to issue certificates where the chain of trust (including the final issued
|
@@ -468,12 +469,12 @@ class _SecretBackendIssuerState:
|
|
468
469
|
return pulumi.get(self, "disable_name_checks")
|
469
470
|
|
470
471
|
@disable_name_checks.setter
|
471
|
-
def disable_name_checks(self, value: Optional[pulumi.Input[bool]]):
|
472
|
+
def disable_name_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
472
473
|
pulumi.set(self, "disable_name_checks", value)
|
473
474
|
|
474
475
|
@property
|
475
476
|
@pulumi.getter(name="disableNameConstraintChecks")
|
476
|
-
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[bool]]:
|
477
|
+
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
477
478
|
"""
|
478
479
|
This determines whether this
|
479
480
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -483,12 +484,12 @@ class _SecretBackendIssuerState:
|
|
483
484
|
return pulumi.get(self, "disable_name_constraint_checks")
|
484
485
|
|
485
486
|
@disable_name_constraint_checks.setter
|
486
|
-
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[bool]]):
|
487
|
+
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
487
488
|
pulumi.set(self, "disable_name_constraint_checks", value)
|
488
489
|
|
489
490
|
@property
|
490
491
|
@pulumi.getter(name="disablePathLengthChecks")
|
491
|
-
def disable_path_length_checks(self) -> Optional[pulumi.Input[bool]]:
|
492
|
+
def disable_path_length_checks(self) -> Optional[pulumi.Input[builtins.bool]]:
|
492
493
|
"""
|
493
494
|
This determines whether this issuer
|
494
495
|
is able to issue certificates where the chain of trust (including the final
|
@@ -498,12 +499,12 @@ class _SecretBackendIssuerState:
|
|
498
499
|
return pulumi.get(self, "disable_path_length_checks")
|
499
500
|
|
500
501
|
@disable_path_length_checks.setter
|
501
|
-
def disable_path_length_checks(self, value: Optional[pulumi.Input[bool]]):
|
502
|
+
def disable_path_length_checks(self, value: Optional[pulumi.Input[builtins.bool]]):
|
502
503
|
pulumi.set(self, "disable_path_length_checks", value)
|
503
504
|
|
504
505
|
@property
|
505
506
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
506
|
-
def enable_aia_url_templating(self) -> Optional[pulumi.Input[bool]]:
|
507
|
+
def enable_aia_url_templating(self) -> Optional[pulumi.Input[builtins.bool]]:
|
507
508
|
"""
|
508
509
|
Specifies that the AIA URL values should
|
509
510
|
be templated.
|
@@ -511,48 +512,48 @@ class _SecretBackendIssuerState:
|
|
511
512
|
return pulumi.get(self, "enable_aia_url_templating")
|
512
513
|
|
513
514
|
@enable_aia_url_templating.setter
|
514
|
-
def enable_aia_url_templating(self, value: Optional[pulumi.Input[bool]]):
|
515
|
+
def enable_aia_url_templating(self, value: Optional[pulumi.Input[builtins.bool]]):
|
515
516
|
pulumi.set(self, "enable_aia_url_templating", value)
|
516
517
|
|
517
518
|
@property
|
518
519
|
@pulumi.getter(name="issuerId")
|
519
|
-
def issuer_id(self) -> Optional[pulumi.Input[str]]:
|
520
|
+
def issuer_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
520
521
|
"""
|
521
522
|
ID of the issuer.
|
522
523
|
"""
|
523
524
|
return pulumi.get(self, "issuer_id")
|
524
525
|
|
525
526
|
@issuer_id.setter
|
526
|
-
def issuer_id(self, value: Optional[pulumi.Input[str]]):
|
527
|
+
def issuer_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
527
528
|
pulumi.set(self, "issuer_id", value)
|
528
529
|
|
529
530
|
@property
|
530
531
|
@pulumi.getter(name="issuerName")
|
531
|
-
def issuer_name(self) -> Optional[pulumi.Input[str]]:
|
532
|
+
def issuer_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
532
533
|
"""
|
533
534
|
Name of the issuer.
|
534
535
|
"""
|
535
536
|
return pulumi.get(self, "issuer_name")
|
536
537
|
|
537
538
|
@issuer_name.setter
|
538
|
-
def issuer_name(self, value: Optional[pulumi.Input[str]]):
|
539
|
+
def issuer_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
539
540
|
pulumi.set(self, "issuer_name", value)
|
540
541
|
|
541
542
|
@property
|
542
543
|
@pulumi.getter(name="issuerRef")
|
543
|
-
def issuer_ref(self) -> Optional[pulumi.Input[str]]:
|
544
|
+
def issuer_ref(self) -> Optional[pulumi.Input[builtins.str]]:
|
544
545
|
"""
|
545
546
|
Reference to an existing issuer.
|
546
547
|
"""
|
547
548
|
return pulumi.get(self, "issuer_ref")
|
548
549
|
|
549
550
|
@issuer_ref.setter
|
550
|
-
def issuer_ref(self, value: Optional[pulumi.Input[str]]):
|
551
|
+
def issuer_ref(self, value: Optional[pulumi.Input[builtins.str]]):
|
551
552
|
pulumi.set(self, "issuer_ref", value)
|
552
553
|
|
553
554
|
@property
|
554
555
|
@pulumi.getter(name="issuingCertificates")
|
555
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
556
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
556
557
|
"""
|
557
558
|
Specifies the URL values for the Issuing
|
558
559
|
Certificate field.
|
@@ -560,12 +561,12 @@ class _SecretBackendIssuerState:
|
|
560
561
|
return pulumi.get(self, "issuing_certificates")
|
561
562
|
|
562
563
|
@issuing_certificates.setter
|
563
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
564
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
564
565
|
pulumi.set(self, "issuing_certificates", value)
|
565
566
|
|
566
567
|
@property
|
567
568
|
@pulumi.getter(name="leafNotAfterBehavior")
|
568
|
-
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[str]]:
|
569
|
+
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[builtins.str]]:
|
569
570
|
"""
|
570
571
|
Behavior of a leaf's NotAfter field during
|
571
572
|
issuance.
|
@@ -573,12 +574,12 @@ class _SecretBackendIssuerState:
|
|
573
574
|
return pulumi.get(self, "leaf_not_after_behavior")
|
574
575
|
|
575
576
|
@leaf_not_after_behavior.setter
|
576
|
-
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[str]]):
|
577
|
+
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[builtins.str]]):
|
577
578
|
pulumi.set(self, "leaf_not_after_behavior", value)
|
578
579
|
|
579
580
|
@property
|
580
581
|
@pulumi.getter(name="manualChains")
|
581
|
-
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
582
|
+
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
582
583
|
"""
|
583
584
|
Chain of issuer references to build this issuer's
|
584
585
|
computed CAChain field from, when non-empty.
|
@@ -586,12 +587,12 @@ class _SecretBackendIssuerState:
|
|
586
587
|
return pulumi.get(self, "manual_chains")
|
587
588
|
|
588
589
|
@manual_chains.setter
|
589
|
-
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
590
|
+
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
590
591
|
pulumi.set(self, "manual_chains", value)
|
591
592
|
|
592
593
|
@property
|
593
594
|
@pulumi.getter
|
594
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
595
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
595
596
|
"""
|
596
597
|
The namespace to provision the resource in.
|
597
598
|
The value should not contain leading or trailing forward slashes.
|
@@ -601,24 +602,24 @@ class _SecretBackendIssuerState:
|
|
601
602
|
return pulumi.get(self, "namespace")
|
602
603
|
|
603
604
|
@namespace.setter
|
604
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
605
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
605
606
|
pulumi.set(self, "namespace", value)
|
606
607
|
|
607
608
|
@property
|
608
609
|
@pulumi.getter(name="ocspServers")
|
609
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
610
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
610
611
|
"""
|
611
612
|
Specifies the URL values for the OCSP Servers field.
|
612
613
|
"""
|
613
614
|
return pulumi.get(self, "ocsp_servers")
|
614
615
|
|
615
616
|
@ocsp_servers.setter
|
616
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
617
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
617
618
|
pulumi.set(self, "ocsp_servers", value)
|
618
619
|
|
619
620
|
@property
|
620
621
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
621
|
-
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[str]]:
|
622
|
+
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
|
622
623
|
"""
|
623
624
|
Which signature algorithm to use
|
624
625
|
when building CRLs.
|
@@ -626,19 +627,19 @@ class _SecretBackendIssuerState:
|
|
626
627
|
return pulumi.get(self, "revocation_signature_algorithm")
|
627
628
|
|
628
629
|
@revocation_signature_algorithm.setter
|
629
|
-
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[str]]):
|
630
|
+
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
|
630
631
|
pulumi.set(self, "revocation_signature_algorithm", value)
|
631
632
|
|
632
633
|
@property
|
633
634
|
@pulumi.getter
|
634
|
-
def usage(self) -> Optional[pulumi.Input[str]]:
|
635
|
+
def usage(self) -> Optional[pulumi.Input[builtins.str]]:
|
635
636
|
"""
|
636
637
|
Allowed usages for this issuer.
|
637
638
|
"""
|
638
639
|
return pulumi.get(self, "usage")
|
639
640
|
|
640
641
|
@usage.setter
|
641
|
-
def usage(self, value: Optional[pulumi.Input[str]]):
|
642
|
+
def usage(self, value: Optional[pulumi.Input[builtins.str]]):
|
642
643
|
pulumi.set(self, "usage", value)
|
643
644
|
|
644
645
|
|
@@ -647,22 +648,22 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
647
648
|
def __init__(__self__,
|
648
649
|
resource_name: str,
|
649
650
|
opts: Optional[pulumi.ResourceOptions] = None,
|
650
|
-
backend: Optional[pulumi.Input[str]] = None,
|
651
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
652
|
-
disable_critical_extension_checks: Optional[pulumi.Input[bool]] = None,
|
653
|
-
disable_name_checks: Optional[pulumi.Input[bool]] = None,
|
654
|
-
disable_name_constraint_checks: Optional[pulumi.Input[bool]] = None,
|
655
|
-
disable_path_length_checks: Optional[pulumi.Input[bool]] = None,
|
656
|
-
enable_aia_url_templating: Optional[pulumi.Input[bool]] = None,
|
657
|
-
issuer_name: Optional[pulumi.Input[str]] = None,
|
658
|
-
issuer_ref: Optional[pulumi.Input[str]] = None,
|
659
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
660
|
-
leaf_not_after_behavior: Optional[pulumi.Input[str]] = None,
|
661
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
662
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
663
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
664
|
-
revocation_signature_algorithm: Optional[pulumi.Input[str]] = None,
|
665
|
-
usage: Optional[pulumi.Input[str]] = None,
|
651
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
652
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
653
|
+
disable_critical_extension_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
654
|
+
disable_name_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
655
|
+
disable_name_constraint_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
656
|
+
disable_path_length_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
657
|
+
enable_aia_url_templating: Optional[pulumi.Input[builtins.bool]] = None,
|
658
|
+
issuer_name: Optional[pulumi.Input[builtins.str]] = None,
|
659
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
660
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
661
|
+
leaf_not_after_behavior: Optional[pulumi.Input[builtins.str]] = None,
|
662
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
663
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
664
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
665
|
+
revocation_signature_algorithm: Optional[pulumi.Input[builtins.str]] = None,
|
666
|
+
usage: Optional[pulumi.Input[builtins.str]] = None,
|
666
667
|
__props__=None):
|
667
668
|
"""
|
668
669
|
## Example Usage
|
@@ -697,43 +698,43 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
697
698
|
|
698
699
|
:param str resource_name: The name of the resource.
|
699
700
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
700
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no
|
701
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
701
702
|
leading or trailing `/`s.
|
702
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL
|
703
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
703
704
|
Distribution Points field.
|
704
|
-
:param pulumi.Input[bool] disable_critical_extension_checks: This determines whether this
|
705
|
+
:param pulumi.Input[builtins.bool] disable_critical_extension_checks: This determines whether this
|
705
706
|
issuer is able to issue certificates where the chain of trust (including the
|
706
707
|
issued certificate) contain critical extensions not processed by Vault.
|
707
|
-
:param pulumi.Input[bool] disable_name_checks: This determines whether this issuer is able
|
708
|
+
:param pulumi.Input[builtins.bool] disable_name_checks: This determines whether this issuer is able
|
708
709
|
to issue certificates where the chain of trust (including the final issued
|
709
710
|
certificate) contains a link in which the subject of the issuing certificate
|
710
711
|
does not match the named issuer of the certificate it signed.
|
711
|
-
:param pulumi.Input[bool] disable_name_constraint_checks: This determines whether this
|
712
|
+
:param pulumi.Input[builtins.bool] disable_name_constraint_checks: This determines whether this
|
712
713
|
issuer is able to issue certificates where the chain of trust (including the
|
713
714
|
final issued certificate) violates the name constraints critical extension of
|
714
715
|
one of the issuer certificates in the chain.
|
715
|
-
:param pulumi.Input[bool] disable_path_length_checks: This determines whether this issuer
|
716
|
+
:param pulumi.Input[builtins.bool] disable_path_length_checks: This determines whether this issuer
|
716
717
|
is able to issue certificates where the chain of trust (including the final
|
717
718
|
issued certificate) is longer than allowed by a certificate authority in that
|
718
719
|
chain.
|
719
|
-
:param pulumi.Input[bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
720
|
+
:param pulumi.Input[builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
720
721
|
be templated.
|
721
|
-
:param pulumi.Input[str] issuer_name: Name of the issuer.
|
722
|
-
:param pulumi.Input[str] issuer_ref: Reference to an existing issuer.
|
723
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing
|
722
|
+
:param pulumi.Input[builtins.str] issuer_name: Name of the issuer.
|
723
|
+
:param pulumi.Input[builtins.str] issuer_ref: Reference to an existing issuer.
|
724
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
724
725
|
Certificate field.
|
725
|
-
:param pulumi.Input[str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
726
|
+
:param pulumi.Input[builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
726
727
|
issuance.
|
727
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] manual_chains: Chain of issuer references to build this issuer's
|
728
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
728
729
|
computed CAChain field from, when non-empty.
|
729
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
730
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
730
731
|
The value should not contain leading or trailing forward slashes.
|
731
732
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
732
733
|
*Available only for Vault Enterprise*.
|
733
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
734
|
-
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
734
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
735
|
+
:param pulumi.Input[builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
735
736
|
when building CRLs.
|
736
|
-
:param pulumi.Input[str] usage: Allowed usages for this issuer.
|
737
|
+
:param pulumi.Input[builtins.str] usage: Allowed usages for this issuer.
|
737
738
|
"""
|
738
739
|
...
|
739
740
|
@overload
|
@@ -787,22 +788,22 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
787
788
|
def _internal_init(__self__,
|
788
789
|
resource_name: str,
|
789
790
|
opts: Optional[pulumi.ResourceOptions] = None,
|
790
|
-
backend: Optional[pulumi.Input[str]] = None,
|
791
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
792
|
-
disable_critical_extension_checks: Optional[pulumi.Input[bool]] = None,
|
793
|
-
disable_name_checks: Optional[pulumi.Input[bool]] = None,
|
794
|
-
disable_name_constraint_checks: Optional[pulumi.Input[bool]] = None,
|
795
|
-
disable_path_length_checks: Optional[pulumi.Input[bool]] = None,
|
796
|
-
enable_aia_url_templating: Optional[pulumi.Input[bool]] = None,
|
797
|
-
issuer_name: Optional[pulumi.Input[str]] = None,
|
798
|
-
issuer_ref: Optional[pulumi.Input[str]] = None,
|
799
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
800
|
-
leaf_not_after_behavior: Optional[pulumi.Input[str]] = None,
|
801
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
802
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
803
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
|
-
revocation_signature_algorithm: Optional[pulumi.Input[str]] = None,
|
805
|
-
usage: Optional[pulumi.Input[str]] = None,
|
791
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
792
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
793
|
+
disable_critical_extension_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
794
|
+
disable_name_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
795
|
+
disable_name_constraint_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
796
|
+
disable_path_length_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
797
|
+
enable_aia_url_templating: Optional[pulumi.Input[builtins.bool]] = None,
|
798
|
+
issuer_name: Optional[pulumi.Input[builtins.str]] = None,
|
799
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
800
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
801
|
+
leaf_not_after_behavior: Optional[pulumi.Input[builtins.str]] = None,
|
802
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
803
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
804
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
805
|
+
revocation_signature_algorithm: Optional[pulumi.Input[builtins.str]] = None,
|
806
|
+
usage: Optional[pulumi.Input[builtins.str]] = None,
|
806
807
|
__props__=None):
|
807
808
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
808
809
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -843,23 +844,23 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
843
844
|
def get(resource_name: str,
|
844
845
|
id: pulumi.Input[str],
|
845
846
|
opts: Optional[pulumi.ResourceOptions] = None,
|
846
|
-
backend: Optional[pulumi.Input[str]] = None,
|
847
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
848
|
-
disable_critical_extension_checks: Optional[pulumi.Input[bool]] = None,
|
849
|
-
disable_name_checks: Optional[pulumi.Input[bool]] = None,
|
850
|
-
disable_name_constraint_checks: Optional[pulumi.Input[bool]] = None,
|
851
|
-
disable_path_length_checks: Optional[pulumi.Input[bool]] = None,
|
852
|
-
enable_aia_url_templating: Optional[pulumi.Input[bool]] = None,
|
853
|
-
issuer_id: Optional[pulumi.Input[str]] = None,
|
854
|
-
issuer_name: Optional[pulumi.Input[str]] = None,
|
855
|
-
issuer_ref: Optional[pulumi.Input[str]] = None,
|
856
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
857
|
-
leaf_not_after_behavior: Optional[pulumi.Input[str]] = None,
|
858
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
859
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
860
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
861
|
-
revocation_signature_algorithm: Optional[pulumi.Input[str]] = None,
|
862
|
-
usage: Optional[pulumi.Input[str]] = None) -> 'SecretBackendIssuer':
|
847
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
848
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
849
|
+
disable_critical_extension_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
850
|
+
disable_name_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
851
|
+
disable_name_constraint_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
852
|
+
disable_path_length_checks: Optional[pulumi.Input[builtins.bool]] = None,
|
853
|
+
enable_aia_url_templating: Optional[pulumi.Input[builtins.bool]] = None,
|
854
|
+
issuer_id: Optional[pulumi.Input[builtins.str]] = None,
|
855
|
+
issuer_name: Optional[pulumi.Input[builtins.str]] = None,
|
856
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
857
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
858
|
+
leaf_not_after_behavior: Optional[pulumi.Input[builtins.str]] = None,
|
859
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
860
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
861
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
862
|
+
revocation_signature_algorithm: Optional[pulumi.Input[builtins.str]] = None,
|
863
|
+
usage: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendIssuer':
|
863
864
|
"""
|
864
865
|
Get an existing SecretBackendIssuer resource's state with the given name, id, and optional extra
|
865
866
|
properties used to qualify the lookup.
|
@@ -867,44 +868,44 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
867
868
|
:param str resource_name: The unique name of the resulting resource.
|
868
869
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
869
870
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
870
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no
|
871
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
871
872
|
leading or trailing `/`s.
|
872
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] crl_distribution_points: Specifies the URL values for the CRL
|
873
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
873
874
|
Distribution Points field.
|
874
|
-
:param pulumi.Input[bool] disable_critical_extension_checks: This determines whether this
|
875
|
+
:param pulumi.Input[builtins.bool] disable_critical_extension_checks: This determines whether this
|
875
876
|
issuer is able to issue certificates where the chain of trust (including the
|
876
877
|
issued certificate) contain critical extensions not processed by Vault.
|
877
|
-
:param pulumi.Input[bool] disable_name_checks: This determines whether this issuer is able
|
878
|
+
:param pulumi.Input[builtins.bool] disable_name_checks: This determines whether this issuer is able
|
878
879
|
to issue certificates where the chain of trust (including the final issued
|
879
880
|
certificate) contains a link in which the subject of the issuing certificate
|
880
881
|
does not match the named issuer of the certificate it signed.
|
881
|
-
:param pulumi.Input[bool] disable_name_constraint_checks: This determines whether this
|
882
|
+
:param pulumi.Input[builtins.bool] disable_name_constraint_checks: This determines whether this
|
882
883
|
issuer is able to issue certificates where the chain of trust (including the
|
883
884
|
final issued certificate) violates the name constraints critical extension of
|
884
885
|
one of the issuer certificates in the chain.
|
885
|
-
:param pulumi.Input[bool] disable_path_length_checks: This determines whether this issuer
|
886
|
+
:param pulumi.Input[builtins.bool] disable_path_length_checks: This determines whether this issuer
|
886
887
|
is able to issue certificates where the chain of trust (including the final
|
887
888
|
issued certificate) is longer than allowed by a certificate authority in that
|
888
889
|
chain.
|
889
|
-
:param pulumi.Input[bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
890
|
+
:param pulumi.Input[builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
890
891
|
be templated.
|
891
|
-
:param pulumi.Input[str] issuer_id: ID of the issuer.
|
892
|
-
:param pulumi.Input[str] issuer_name: Name of the issuer.
|
893
|
-
:param pulumi.Input[str] issuer_ref: Reference to an existing issuer.
|
894
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] issuing_certificates: Specifies the URL values for the Issuing
|
892
|
+
:param pulumi.Input[builtins.str] issuer_id: ID of the issuer.
|
893
|
+
:param pulumi.Input[builtins.str] issuer_name: Name of the issuer.
|
894
|
+
:param pulumi.Input[builtins.str] issuer_ref: Reference to an existing issuer.
|
895
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
895
896
|
Certificate field.
|
896
|
-
:param pulumi.Input[str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
897
|
+
:param pulumi.Input[builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
897
898
|
issuance.
|
898
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] manual_chains: Chain of issuer references to build this issuer's
|
899
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
899
900
|
computed CAChain field from, when non-empty.
|
900
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
901
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
901
902
|
The value should not contain leading or trailing forward slashes.
|
902
903
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
903
904
|
*Available only for Vault Enterprise*.
|
904
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
905
|
-
:param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
|
905
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
906
|
+
:param pulumi.Input[builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
906
907
|
when building CRLs.
|
907
|
-
:param pulumi.Input[str] usage: Allowed usages for this issuer.
|
908
|
+
:param pulumi.Input[builtins.str] usage: Allowed usages for this issuer.
|
908
909
|
"""
|
909
910
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
910
911
|
|
@@ -931,7 +932,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
931
932
|
|
932
933
|
@property
|
933
934
|
@pulumi.getter
|
934
|
-
def backend(self) -> pulumi.Output[str]:
|
935
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
935
936
|
"""
|
936
937
|
The path the PKI secret backend is mounted at, with no
|
937
938
|
leading or trailing `/`s.
|
@@ -940,7 +941,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
940
941
|
|
941
942
|
@property
|
942
943
|
@pulumi.getter(name="crlDistributionPoints")
|
943
|
-
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
944
|
+
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
944
945
|
"""
|
945
946
|
Specifies the URL values for the CRL
|
946
947
|
Distribution Points field.
|
@@ -949,7 +950,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
949
950
|
|
950
951
|
@property
|
951
952
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
952
|
-
def disable_critical_extension_checks(self) -> pulumi.Output[Optional[bool]]:
|
953
|
+
def disable_critical_extension_checks(self) -> pulumi.Output[Optional[builtins.bool]]:
|
953
954
|
"""
|
954
955
|
This determines whether this
|
955
956
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -959,7 +960,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
959
960
|
|
960
961
|
@property
|
961
962
|
@pulumi.getter(name="disableNameChecks")
|
962
|
-
def disable_name_checks(self) -> pulumi.Output[Optional[bool]]:
|
963
|
+
def disable_name_checks(self) -> pulumi.Output[Optional[builtins.bool]]:
|
963
964
|
"""
|
964
965
|
This determines whether this issuer is able
|
965
966
|
to issue certificates where the chain of trust (including the final issued
|
@@ -970,7 +971,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
970
971
|
|
971
972
|
@property
|
972
973
|
@pulumi.getter(name="disableNameConstraintChecks")
|
973
|
-
def disable_name_constraint_checks(self) -> pulumi.Output[Optional[bool]]:
|
974
|
+
def disable_name_constraint_checks(self) -> pulumi.Output[Optional[builtins.bool]]:
|
974
975
|
"""
|
975
976
|
This determines whether this
|
976
977
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -981,7 +982,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
981
982
|
|
982
983
|
@property
|
983
984
|
@pulumi.getter(name="disablePathLengthChecks")
|
984
|
-
def disable_path_length_checks(self) -> pulumi.Output[Optional[bool]]:
|
985
|
+
def disable_path_length_checks(self) -> pulumi.Output[Optional[builtins.bool]]:
|
985
986
|
"""
|
986
987
|
This determines whether this issuer
|
987
988
|
is able to issue certificates where the chain of trust (including the final
|
@@ -992,7 +993,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
992
993
|
|
993
994
|
@property
|
994
995
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
995
|
-
def enable_aia_url_templating(self) -> pulumi.Output[Optional[bool]]:
|
996
|
+
def enable_aia_url_templating(self) -> pulumi.Output[Optional[builtins.bool]]:
|
996
997
|
"""
|
997
998
|
Specifies that the AIA URL values should
|
998
999
|
be templated.
|
@@ -1001,7 +1002,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1001
1002
|
|
1002
1003
|
@property
|
1003
1004
|
@pulumi.getter(name="issuerId")
|
1004
|
-
def issuer_id(self) -> pulumi.Output[str]:
|
1005
|
+
def issuer_id(self) -> pulumi.Output[builtins.str]:
|
1005
1006
|
"""
|
1006
1007
|
ID of the issuer.
|
1007
1008
|
"""
|
@@ -1009,7 +1010,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1009
1010
|
|
1010
1011
|
@property
|
1011
1012
|
@pulumi.getter(name="issuerName")
|
1012
|
-
def issuer_name(self) -> pulumi.Output[Optional[str]]:
|
1013
|
+
def issuer_name(self) -> pulumi.Output[Optional[builtins.str]]:
|
1013
1014
|
"""
|
1014
1015
|
Name of the issuer.
|
1015
1016
|
"""
|
@@ -1017,7 +1018,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1017
1018
|
|
1018
1019
|
@property
|
1019
1020
|
@pulumi.getter(name="issuerRef")
|
1020
|
-
def issuer_ref(self) -> pulumi.Output[str]:
|
1021
|
+
def issuer_ref(self) -> pulumi.Output[builtins.str]:
|
1021
1022
|
"""
|
1022
1023
|
Reference to an existing issuer.
|
1023
1024
|
"""
|
@@ -1025,7 +1026,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1025
1026
|
|
1026
1027
|
@property
|
1027
1028
|
@pulumi.getter(name="issuingCertificates")
|
1028
|
-
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1029
|
+
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1029
1030
|
"""
|
1030
1031
|
Specifies the URL values for the Issuing
|
1031
1032
|
Certificate field.
|
@@ -1034,7 +1035,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1034
1035
|
|
1035
1036
|
@property
|
1036
1037
|
@pulumi.getter(name="leafNotAfterBehavior")
|
1037
|
-
def leaf_not_after_behavior(self) -> pulumi.Output[str]:
|
1038
|
+
def leaf_not_after_behavior(self) -> pulumi.Output[builtins.str]:
|
1038
1039
|
"""
|
1039
1040
|
Behavior of a leaf's NotAfter field during
|
1040
1041
|
issuance.
|
@@ -1043,7 +1044,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1043
1044
|
|
1044
1045
|
@property
|
1045
1046
|
@pulumi.getter(name="manualChains")
|
1046
|
-
def manual_chains(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1047
|
+
def manual_chains(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1047
1048
|
"""
|
1048
1049
|
Chain of issuer references to build this issuer's
|
1049
1050
|
computed CAChain field from, when non-empty.
|
@@ -1052,7 +1053,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1052
1053
|
|
1053
1054
|
@property
|
1054
1055
|
@pulumi.getter
|
1055
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
1056
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
1056
1057
|
"""
|
1057
1058
|
The namespace to provision the resource in.
|
1058
1059
|
The value should not contain leading or trailing forward slashes.
|
@@ -1063,7 +1064,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1063
1064
|
|
1064
1065
|
@property
|
1065
1066
|
@pulumi.getter(name="ocspServers")
|
1066
|
-
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1067
|
+
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1067
1068
|
"""
|
1068
1069
|
Specifies the URL values for the OCSP Servers field.
|
1069
1070
|
"""
|
@@ -1071,7 +1072,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1071
1072
|
|
1072
1073
|
@property
|
1073
1074
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
1074
|
-
def revocation_signature_algorithm(self) -> pulumi.Output[str]:
|
1075
|
+
def revocation_signature_algorithm(self) -> pulumi.Output[builtins.str]:
|
1075
1076
|
"""
|
1076
1077
|
Which signature algorithm to use
|
1077
1078
|
when building CRLs.
|
@@ -1080,7 +1081,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1080
1081
|
|
1081
1082
|
@property
|
1082
1083
|
@pulumi.getter
|
1083
|
-
def usage(self) -> pulumi.Output[str]:
|
1084
|
+
def usage(self) -> pulumi.Output[builtins.str]:
|
1084
1085
|
"""
|
1085
1086
|
Allowed usages for this issuer.
|
1086
1087
|
"""
|