pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -27,7 +28,7 @@ MYPY = False
|
|
27
28
|
|
28
29
|
if not MYPY:
|
29
30
|
class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
|
30
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
31
32
|
"""
|
32
33
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
33
34
|
"""
|
@@ -37,33 +38,33 @@ elif False:
|
|
37
38
|
@pulumi.input_type
|
38
39
|
class BackendConfigCmpv2AuthenticatorsArgs:
|
39
40
|
def __init__(__self__, *,
|
40
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
41
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
41
42
|
"""
|
42
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
43
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
43
44
|
"""
|
44
45
|
if cert is not None:
|
45
46
|
pulumi.set(__self__, "cert", cert)
|
46
47
|
|
47
48
|
@property
|
48
49
|
@pulumi.getter
|
49
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
50
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
50
51
|
"""
|
51
52
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
52
53
|
"""
|
53
54
|
return pulumi.get(self, "cert")
|
54
55
|
|
55
56
|
@cert.setter
|
56
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
57
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
57
58
|
pulumi.set(self, "cert", value)
|
58
59
|
|
59
60
|
|
60
61
|
if not MYPY:
|
61
62
|
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
62
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
63
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
63
64
|
"""
|
64
65
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
65
66
|
"""
|
66
|
-
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
67
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
67
68
|
"""
|
68
69
|
"The accessor (required) property for user pass auth backends".
|
69
70
|
"""
|
@@ -73,11 +74,11 @@ elif False:
|
|
73
74
|
@pulumi.input_type
|
74
75
|
class BackendConfigEstAuthenticatorsArgs:
|
75
76
|
def __init__(__self__, *,
|
76
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
77
|
-
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
77
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
78
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
78
79
|
"""
|
79
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
80
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
|
80
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
81
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: "The accessor (required) property for user pass auth backends".
|
81
82
|
"""
|
82
83
|
if cert is not None:
|
83
84
|
pulumi.set(__self__, "cert", cert)
|
@@ -86,40 +87,40 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
90
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
90
91
|
"""
|
91
92
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
92
93
|
"""
|
93
94
|
return pulumi.get(self, "cert")
|
94
95
|
|
95
96
|
@cert.setter
|
96
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
97
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
97
98
|
pulumi.set(self, "cert", value)
|
98
99
|
|
99
100
|
@property
|
100
101
|
@pulumi.getter
|
101
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
102
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
102
103
|
"""
|
103
104
|
"The accessor (required) property for user pass auth backends".
|
104
105
|
"""
|
105
106
|
return pulumi.get(self, "userpass")
|
106
107
|
|
107
108
|
@userpass.setter
|
108
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
109
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
109
110
|
pulumi.set(self, "userpass", value)
|
110
111
|
|
111
112
|
|
112
113
|
if not MYPY:
|
113
114
|
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
114
|
-
oid: pulumi.Input[str]
|
115
|
+
oid: pulumi.Input[builtins.str]
|
115
116
|
"""
|
116
117
|
The OID for the policy identifier
|
117
118
|
"""
|
118
|
-
cps: NotRequired[pulumi.Input[str]]
|
119
|
+
cps: NotRequired[pulumi.Input[builtins.str]]
|
119
120
|
"""
|
120
121
|
The URL of the CPS for the policy identifier
|
121
122
|
"""
|
122
|
-
notice: NotRequired[pulumi.Input[str]]
|
123
|
+
notice: NotRequired[pulumi.Input[builtins.str]]
|
123
124
|
"""
|
124
125
|
A notice for the policy identifier
|
125
126
|
"""
|
@@ -129,13 +130,13 @@ elif False:
|
|
129
130
|
@pulumi.input_type
|
130
131
|
class SecretBackendRolePolicyIdentifierArgs:
|
131
132
|
def __init__(__self__, *,
|
132
|
-
oid: pulumi.Input[str],
|
133
|
-
cps: Optional[pulumi.Input[str]] = None,
|
134
|
-
notice: Optional[pulumi.Input[str]] = None):
|
133
|
+
oid: pulumi.Input[builtins.str],
|
134
|
+
cps: Optional[pulumi.Input[builtins.str]] = None,
|
135
|
+
notice: Optional[pulumi.Input[builtins.str]] = None):
|
135
136
|
"""
|
136
|
-
:param pulumi.Input[str] oid: The OID for the policy identifier
|
137
|
-
:param pulumi.Input[str] cps: The URL of the CPS for the policy identifier
|
138
|
-
:param pulumi.Input[str] notice: A notice for the policy identifier
|
137
|
+
:param pulumi.Input[builtins.str] oid: The OID for the policy identifier
|
138
|
+
:param pulumi.Input[builtins.str] cps: The URL of the CPS for the policy identifier
|
139
|
+
:param pulumi.Input[builtins.str] notice: A notice for the policy identifier
|
139
140
|
"""
|
140
141
|
pulumi.set(__self__, "oid", oid)
|
141
142
|
if cps is not None:
|
@@ -145,38 +146,38 @@ class SecretBackendRolePolicyIdentifierArgs:
|
|
145
146
|
|
146
147
|
@property
|
147
148
|
@pulumi.getter
|
148
|
-
def oid(self) -> pulumi.Input[str]:
|
149
|
+
def oid(self) -> pulumi.Input[builtins.str]:
|
149
150
|
"""
|
150
151
|
The OID for the policy identifier
|
151
152
|
"""
|
152
153
|
return pulumi.get(self, "oid")
|
153
154
|
|
154
155
|
@oid.setter
|
155
|
-
def oid(self, value: pulumi.Input[str]):
|
156
|
+
def oid(self, value: pulumi.Input[builtins.str]):
|
156
157
|
pulumi.set(self, "oid", value)
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter
|
160
|
-
def cps(self) -> Optional[pulumi.Input[str]]:
|
161
|
+
def cps(self) -> Optional[pulumi.Input[builtins.str]]:
|
161
162
|
"""
|
162
163
|
The URL of the CPS for the policy identifier
|
163
164
|
"""
|
164
165
|
return pulumi.get(self, "cps")
|
165
166
|
|
166
167
|
@cps.setter
|
167
|
-
def cps(self, value: Optional[pulumi.Input[str]]):
|
168
|
+
def cps(self, value: Optional[pulumi.Input[builtins.str]]):
|
168
169
|
pulumi.set(self, "cps", value)
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter
|
172
|
-
def notice(self) -> Optional[pulumi.Input[str]]:
|
173
|
+
def notice(self) -> Optional[pulumi.Input[builtins.str]]:
|
173
174
|
"""
|
174
175
|
A notice for the policy identifier
|
175
176
|
"""
|
176
177
|
return pulumi.get(self, "notice")
|
177
178
|
|
178
179
|
@notice.setter
|
179
|
-
def notice(self, value: Optional[pulumi.Input[str]]):
|
180
|
+
def notice(self, value: Optional[pulumi.Input[builtins.str]]):
|
180
181
|
pulumi.set(self, "notice", value)
|
181
182
|
|
182
183
|
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,20 +20,20 @@ __all__ = ['BackendAcmeEabArgs', 'BackendAcmeEab']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class BackendAcmeEabArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
-
role: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
role: Optional[pulumi.Input[builtins.str]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a BackendAcmeEab resource.
|
28
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
29
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
29
30
|
create the EAB token within, with no leading or trailing `/`s.
|
30
|
-
:param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
31
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
31
|
+
:param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
32
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
32
33
|
The value should not contain leading or trailing forward slashes.
|
33
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
35
|
*Available only for Vault Enterprise*.
|
35
|
-
:param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
|
36
|
+
:param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
36
37
|
|
37
38
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
38
39
|
|
@@ -51,7 +52,7 @@ class BackendAcmeEabArgs:
|
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def backend(self) -> pulumi.Input[str]:
|
55
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
55
56
|
"""
|
56
57
|
The path to the PKI secret backend to
|
57
58
|
create the EAB token within, with no leading or trailing `/`s.
|
@@ -59,24 +60,24 @@ class BackendAcmeEabArgs:
|
|
59
60
|
return pulumi.get(self, "backend")
|
60
61
|
|
61
62
|
@backend.setter
|
62
|
-
def backend(self, value: pulumi.Input[str]):
|
63
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
63
64
|
pulumi.set(self, "backend", value)
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter
|
67
|
-
def issuer(self) -> Optional[pulumi.Input[str]]:
|
68
|
+
def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
|
68
69
|
"""
|
69
70
|
Create an EAB token that is specific to an issuer's ACME directory.
|
70
71
|
"""
|
71
72
|
return pulumi.get(self, "issuer")
|
72
73
|
|
73
74
|
@issuer.setter
|
74
|
-
def issuer(self, value: Optional[pulumi.Input[str]]):
|
75
|
+
def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
|
75
76
|
pulumi.set(self, "issuer", value)
|
76
77
|
|
77
78
|
@property
|
78
79
|
@pulumi.getter
|
79
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
80
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
80
81
|
"""
|
81
82
|
The namespace of the target resource.
|
82
83
|
The value should not contain leading or trailing forward slashes.
|
@@ -86,12 +87,12 @@ class BackendAcmeEabArgs:
|
|
86
87
|
return pulumi.get(self, "namespace")
|
87
88
|
|
88
89
|
@namespace.setter
|
89
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
90
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
90
91
|
pulumi.set(self, "namespace", value)
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
95
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
95
96
|
"""
|
96
97
|
Create an EAB token that is specific to a role's ACME directory.
|
97
98
|
|
@@ -105,37 +106,37 @@ class BackendAcmeEabArgs:
|
|
105
106
|
return pulumi.get(self, "role")
|
106
107
|
|
107
108
|
@role.setter
|
108
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
109
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
109
110
|
pulumi.set(self, "role", value)
|
110
111
|
|
111
112
|
|
112
113
|
@pulumi.input_type
|
113
114
|
class _BackendAcmeEabState:
|
114
115
|
def __init__(__self__, *,
|
115
|
-
acme_directory: Optional[pulumi.Input[str]] = None,
|
116
|
-
backend: Optional[pulumi.Input[str]] = None,
|
117
|
-
created_on: Optional[pulumi.Input[str]] = None,
|
118
|
-
eab_id: Optional[pulumi.Input[str]] = None,
|
119
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
120
|
-
key: Optional[pulumi.Input[str]] = None,
|
121
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
122
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
123
|
-
role: Optional[pulumi.Input[str]] = None):
|
116
|
+
acme_directory: Optional[pulumi.Input[builtins.str]] = None,
|
117
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
118
|
+
created_on: Optional[pulumi.Input[builtins.str]] = None,
|
119
|
+
eab_id: Optional[pulumi.Input[builtins.str]] = None,
|
120
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
121
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
122
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
123
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
124
|
+
role: Optional[pulumi.Input[builtins.str]] = None):
|
124
125
|
"""
|
125
126
|
Input properties used for looking up and filtering BackendAcmeEab resources.
|
126
|
-
:param pulumi.Input[str] acme_directory: The ACME directory to which the key belongs
|
127
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
127
|
+
:param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
|
128
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
128
129
|
create the EAB token within, with no leading or trailing `/`s.
|
129
|
-
:param pulumi.Input[str] created_on: An RFC3339 formatted date time when the EAB token was created
|
130
|
-
:param pulumi.Input[str] eab_id: The identifier of a specific ACME EAB token
|
131
|
-
:param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
132
|
-
:param pulumi.Input[str] key: The EAB token
|
133
|
-
:param pulumi.Input[str] key_type: The key type of the EAB key
|
134
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
130
|
+
:param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
|
131
|
+
:param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
|
132
|
+
:param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
133
|
+
:param pulumi.Input[builtins.str] key: The EAB token
|
134
|
+
:param pulumi.Input[builtins.str] key_type: The key type of the EAB key
|
135
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
135
136
|
The value should not contain leading or trailing forward slashes.
|
136
137
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
137
138
|
*Available only for Vault Enterprise*.
|
138
|
-
:param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
|
139
|
+
:param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
139
140
|
|
140
141
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
141
142
|
|
@@ -165,19 +166,19 @@ class _BackendAcmeEabState:
|
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter(name="acmeDirectory")
|
168
|
-
def acme_directory(self) -> Optional[pulumi.Input[str]]:
|
169
|
+
def acme_directory(self) -> Optional[pulumi.Input[builtins.str]]:
|
169
170
|
"""
|
170
171
|
The ACME directory to which the key belongs
|
171
172
|
"""
|
172
173
|
return pulumi.get(self, "acme_directory")
|
173
174
|
|
174
175
|
@acme_directory.setter
|
175
|
-
def acme_directory(self, value: Optional[pulumi.Input[str]]):
|
176
|
+
def acme_directory(self, value: Optional[pulumi.Input[builtins.str]]):
|
176
177
|
pulumi.set(self, "acme_directory", value)
|
177
178
|
|
178
179
|
@property
|
179
180
|
@pulumi.getter
|
180
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
181
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
181
182
|
"""
|
182
183
|
The path to the PKI secret backend to
|
183
184
|
create the EAB token within, with no leading or trailing `/`s.
|
@@ -185,72 +186,72 @@ class _BackendAcmeEabState:
|
|
185
186
|
return pulumi.get(self, "backend")
|
186
187
|
|
187
188
|
@backend.setter
|
188
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
189
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
189
190
|
pulumi.set(self, "backend", value)
|
190
191
|
|
191
192
|
@property
|
192
193
|
@pulumi.getter(name="createdOn")
|
193
|
-
def created_on(self) -> Optional[pulumi.Input[str]]:
|
194
|
+
def created_on(self) -> Optional[pulumi.Input[builtins.str]]:
|
194
195
|
"""
|
195
196
|
An RFC3339 formatted date time when the EAB token was created
|
196
197
|
"""
|
197
198
|
return pulumi.get(self, "created_on")
|
198
199
|
|
199
200
|
@created_on.setter
|
200
|
-
def created_on(self, value: Optional[pulumi.Input[str]]):
|
201
|
+
def created_on(self, value: Optional[pulumi.Input[builtins.str]]):
|
201
202
|
pulumi.set(self, "created_on", value)
|
202
203
|
|
203
204
|
@property
|
204
205
|
@pulumi.getter(name="eabId")
|
205
|
-
def eab_id(self) -> Optional[pulumi.Input[str]]:
|
206
|
+
def eab_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
206
207
|
"""
|
207
208
|
The identifier of a specific ACME EAB token
|
208
209
|
"""
|
209
210
|
return pulumi.get(self, "eab_id")
|
210
211
|
|
211
212
|
@eab_id.setter
|
212
|
-
def eab_id(self, value: Optional[pulumi.Input[str]]):
|
213
|
+
def eab_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
213
214
|
pulumi.set(self, "eab_id", value)
|
214
215
|
|
215
216
|
@property
|
216
217
|
@pulumi.getter
|
217
|
-
def issuer(self) -> Optional[pulumi.Input[str]]:
|
218
|
+
def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
|
218
219
|
"""
|
219
220
|
Create an EAB token that is specific to an issuer's ACME directory.
|
220
221
|
"""
|
221
222
|
return pulumi.get(self, "issuer")
|
222
223
|
|
223
224
|
@issuer.setter
|
224
|
-
def issuer(self, value: Optional[pulumi.Input[str]]):
|
225
|
+
def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
|
225
226
|
pulumi.set(self, "issuer", value)
|
226
227
|
|
227
228
|
@property
|
228
229
|
@pulumi.getter
|
229
|
-
def key(self) -> Optional[pulumi.Input[str]]:
|
230
|
+
def key(self) -> Optional[pulumi.Input[builtins.str]]:
|
230
231
|
"""
|
231
232
|
The EAB token
|
232
233
|
"""
|
233
234
|
return pulumi.get(self, "key")
|
234
235
|
|
235
236
|
@key.setter
|
236
|
-
def key(self, value: Optional[pulumi.Input[str]]):
|
237
|
+
def key(self, value: Optional[pulumi.Input[builtins.str]]):
|
237
238
|
pulumi.set(self, "key", value)
|
238
239
|
|
239
240
|
@property
|
240
241
|
@pulumi.getter(name="keyType")
|
241
|
-
def key_type(self) -> Optional[pulumi.Input[str]]:
|
242
|
+
def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
242
243
|
"""
|
243
244
|
The key type of the EAB key
|
244
245
|
"""
|
245
246
|
return pulumi.get(self, "key_type")
|
246
247
|
|
247
248
|
@key_type.setter
|
248
|
-
def key_type(self, value: Optional[pulumi.Input[str]]):
|
249
|
+
def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
249
250
|
pulumi.set(self, "key_type", value)
|
250
251
|
|
251
252
|
@property
|
252
253
|
@pulumi.getter
|
253
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
254
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
254
255
|
"""
|
255
256
|
The namespace of the target resource.
|
256
257
|
The value should not contain leading or trailing forward slashes.
|
@@ -260,12 +261,12 @@ class _BackendAcmeEabState:
|
|
260
261
|
return pulumi.get(self, "namespace")
|
261
262
|
|
262
263
|
@namespace.setter
|
263
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
264
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
264
265
|
pulumi.set(self, "namespace", value)
|
265
266
|
|
266
267
|
@property
|
267
268
|
@pulumi.getter
|
268
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
269
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
269
270
|
"""
|
270
271
|
Create an EAB token that is specific to a role's ACME directory.
|
271
272
|
|
@@ -279,7 +280,7 @@ class _BackendAcmeEabState:
|
|
279
280
|
return pulumi.get(self, "role")
|
280
281
|
|
281
282
|
@role.setter
|
282
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
283
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
283
284
|
pulumi.set(self, "role", value)
|
284
285
|
|
285
286
|
|
@@ -288,10 +289,10 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
288
289
|
def __init__(__self__,
|
289
290
|
resource_name: str,
|
290
291
|
opts: Optional[pulumi.ResourceOptions] = None,
|
291
|
-
backend: Optional[pulumi.Input[str]] = None,
|
292
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
293
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
294
|
-
role: Optional[pulumi.Input[str]] = None,
|
292
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
293
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
294
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
295
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
295
296
|
__props__=None):
|
296
297
|
"""
|
297
298
|
Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
|
@@ -317,14 +318,14 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
317
318
|
|
318
319
|
:param str resource_name: The name of the resource.
|
319
320
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
320
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
321
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
321
322
|
create the EAB token within, with no leading or trailing `/`s.
|
322
|
-
:param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
323
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
323
|
+
:param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
324
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
324
325
|
The value should not contain leading or trailing forward slashes.
|
325
326
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
326
327
|
*Available only for Vault Enterprise*.
|
327
|
-
:param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
|
328
|
+
:param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
328
329
|
|
329
330
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
330
331
|
|
@@ -376,10 +377,10 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
376
377
|
def _internal_init(__self__,
|
377
378
|
resource_name: str,
|
378
379
|
opts: Optional[pulumi.ResourceOptions] = None,
|
379
|
-
backend: Optional[pulumi.Input[str]] = None,
|
380
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
381
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
382
|
-
role: Optional[pulumi.Input[str]] = None,
|
380
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
381
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
382
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
383
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
383
384
|
__props__=None):
|
384
385
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
385
386
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -412,15 +413,15 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
412
413
|
def get(resource_name: str,
|
413
414
|
id: pulumi.Input[str],
|
414
415
|
opts: Optional[pulumi.ResourceOptions] = None,
|
415
|
-
acme_directory: Optional[pulumi.Input[str]] = None,
|
416
|
-
backend: Optional[pulumi.Input[str]] = None,
|
417
|
-
created_on: Optional[pulumi.Input[str]] = None,
|
418
|
-
eab_id: Optional[pulumi.Input[str]] = None,
|
419
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
420
|
-
key: Optional[pulumi.Input[str]] = None,
|
421
|
-
key_type: Optional[pulumi.Input[str]] = None,
|
422
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
423
|
-
role: Optional[pulumi.Input[str]] = None) -> 'BackendAcmeEab':
|
416
|
+
acme_directory: Optional[pulumi.Input[builtins.str]] = None,
|
417
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
418
|
+
created_on: Optional[pulumi.Input[builtins.str]] = None,
|
419
|
+
eab_id: Optional[pulumi.Input[builtins.str]] = None,
|
420
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
421
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
422
|
+
key_type: Optional[pulumi.Input[builtins.str]] = None,
|
423
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
424
|
+
role: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendAcmeEab':
|
424
425
|
"""
|
425
426
|
Get an existing BackendAcmeEab resource's state with the given name, id, and optional extra
|
426
427
|
properties used to qualify the lookup.
|
@@ -428,19 +429,19 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
428
429
|
:param str resource_name: The unique name of the resulting resource.
|
429
430
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
430
431
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
431
|
-
:param pulumi.Input[str] acme_directory: The ACME directory to which the key belongs
|
432
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
432
|
+
:param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
|
433
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
433
434
|
create the EAB token within, with no leading or trailing `/`s.
|
434
|
-
:param pulumi.Input[str] created_on: An RFC3339 formatted date time when the EAB token was created
|
435
|
-
:param pulumi.Input[str] eab_id: The identifier of a specific ACME EAB token
|
436
|
-
:param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
437
|
-
:param pulumi.Input[str] key: The EAB token
|
438
|
-
:param pulumi.Input[str] key_type: The key type of the EAB key
|
439
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
435
|
+
:param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
|
436
|
+
:param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
|
437
|
+
:param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
|
438
|
+
:param pulumi.Input[builtins.str] key: The EAB token
|
439
|
+
:param pulumi.Input[builtins.str] key_type: The key type of the EAB key
|
440
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
440
441
|
The value should not contain leading or trailing forward slashes.
|
441
442
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
442
443
|
*Available only for Vault Enterprise*.
|
443
|
-
:param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
|
444
|
+
:param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
|
444
445
|
|
445
446
|
**NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
|
446
447
|
|
@@ -466,7 +467,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
466
467
|
|
467
468
|
@property
|
468
469
|
@pulumi.getter(name="acmeDirectory")
|
469
|
-
def acme_directory(self) -> pulumi.Output[str]:
|
470
|
+
def acme_directory(self) -> pulumi.Output[builtins.str]:
|
470
471
|
"""
|
471
472
|
The ACME directory to which the key belongs
|
472
473
|
"""
|
@@ -474,7 +475,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
474
475
|
|
475
476
|
@property
|
476
477
|
@pulumi.getter
|
477
|
-
def backend(self) -> pulumi.Output[str]:
|
478
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
478
479
|
"""
|
479
480
|
The path to the PKI secret backend to
|
480
481
|
create the EAB token within, with no leading or trailing `/`s.
|
@@ -483,7 +484,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
483
484
|
|
484
485
|
@property
|
485
486
|
@pulumi.getter(name="createdOn")
|
486
|
-
def created_on(self) -> pulumi.Output[str]:
|
487
|
+
def created_on(self) -> pulumi.Output[builtins.str]:
|
487
488
|
"""
|
488
489
|
An RFC3339 formatted date time when the EAB token was created
|
489
490
|
"""
|
@@ -491,7 +492,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
491
492
|
|
492
493
|
@property
|
493
494
|
@pulumi.getter(name="eabId")
|
494
|
-
def eab_id(self) -> pulumi.Output[str]:
|
495
|
+
def eab_id(self) -> pulumi.Output[builtins.str]:
|
495
496
|
"""
|
496
497
|
The identifier of a specific ACME EAB token
|
497
498
|
"""
|
@@ -499,7 +500,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
499
500
|
|
500
501
|
@property
|
501
502
|
@pulumi.getter
|
502
|
-
def issuer(self) -> pulumi.Output[Optional[str]]:
|
503
|
+
def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
|
503
504
|
"""
|
504
505
|
Create an EAB token that is specific to an issuer's ACME directory.
|
505
506
|
"""
|
@@ -507,7 +508,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
507
508
|
|
508
509
|
@property
|
509
510
|
@pulumi.getter
|
510
|
-
def key(self) -> pulumi.Output[str]:
|
511
|
+
def key(self) -> pulumi.Output[builtins.str]:
|
511
512
|
"""
|
512
513
|
The EAB token
|
513
514
|
"""
|
@@ -515,7 +516,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
515
516
|
|
516
517
|
@property
|
517
518
|
@pulumi.getter(name="keyType")
|
518
|
-
def key_type(self) -> pulumi.Output[str]:
|
519
|
+
def key_type(self) -> pulumi.Output[builtins.str]:
|
519
520
|
"""
|
520
521
|
The key type of the EAB key
|
521
522
|
"""
|
@@ -523,7 +524,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
523
524
|
|
524
525
|
@property
|
525
526
|
@pulumi.getter
|
526
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
527
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
527
528
|
"""
|
528
529
|
The namespace of the target resource.
|
529
530
|
The value should not contain leading or trailing forward slashes.
|
@@ -534,7 +535,7 @@ class BackendAcmeEab(pulumi.CustomResource):
|
|
534
535
|
|
535
536
|
@property
|
536
537
|
@pulumi.getter
|
537
|
-
def role(self) -> pulumi.Output[Optional[str]]:
|
538
|
+
def role(self) -> pulumi.Output[Optional[builtins.str]]:
|
538
539
|
"""
|
539
540
|
Create an EAB token that is specific to a role's ACME directory.
|
540
541
|
|