pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,31 +20,31 @@ __all__ = ['BackendConfigAcmeArgs', 'BackendConfigAcme']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class BackendConfigAcmeArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
enabled: pulumi.Input[bool],
|
24
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
|
25
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
default_directory_policy: Optional[pulumi.Input[str]] = None,
|
28
|
-
dns_resolver: Optional[pulumi.Input[str]] = None,
|
29
|
-
eab_policy: Optional[pulumi.Input[str]] = None,
|
30
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
31
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
enabled: pulumi.Input[builtins.bool],
|
25
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
27
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
28
|
+
default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
eab_policy: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
32
33
|
"""
|
33
34
|
The set of arguments for constructing a BackendConfigAcme resource.
|
34
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
35
|
-
:param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
|
36
|
-
:param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
39
|
-
:param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
35
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
36
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
|
37
|
+
:param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
40
|
+
:param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
40
41
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
41
|
-
:param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
42
|
+
:param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
42
43
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
43
|
-
:param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
44
|
+
:param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
44
45
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
45
|
-
:param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
46
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
47
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
47
48
|
The value should not contain leading or trailing forward slashes.
|
48
49
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
49
50
|
*Available only for Vault Enterprise*.
|
@@ -69,67 +70,67 @@ class BackendConfigAcmeArgs:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter
|
72
|
-
def backend(self) -> pulumi.Input[str]:
|
73
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
73
74
|
"""
|
74
75
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
75
76
|
"""
|
76
77
|
return pulumi.get(self, "backend")
|
77
78
|
|
78
79
|
@backend.setter
|
79
|
-
def backend(self, value: pulumi.Input[str]):
|
80
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
80
81
|
pulumi.set(self, "backend", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def enabled(self) -> pulumi.Input[bool]:
|
85
|
+
def enabled(self) -> pulumi.Input[builtins.bool]:
|
85
86
|
"""
|
86
87
|
Specifies whether ACME is enabled.
|
87
88
|
"""
|
88
89
|
return pulumi.get(self, "enabled")
|
89
90
|
|
90
91
|
@enabled.setter
|
91
|
-
def enabled(self, value: pulumi.Input[bool]):
|
92
|
+
def enabled(self, value: pulumi.Input[builtins.bool]):
|
92
93
|
pulumi.set(self, "enabled", value)
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
96
|
-
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[bool]]:
|
97
|
+
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
|
97
98
|
"""
|
98
99
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
99
100
|
"""
|
100
101
|
return pulumi.get(self, "allow_role_ext_key_usage")
|
101
102
|
|
102
103
|
@allow_role_ext_key_usage.setter
|
103
|
-
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[bool]]):
|
104
|
+
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
|
104
105
|
pulumi.set(self, "allow_role_ext_key_usage", value)
|
105
106
|
|
106
107
|
@property
|
107
108
|
@pulumi.getter(name="allowedIssuers")
|
108
|
-
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
109
|
+
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
109
110
|
"""
|
110
111
|
Specifies which issuers are allowed for use with ACME.
|
111
112
|
"""
|
112
113
|
return pulumi.get(self, "allowed_issuers")
|
113
114
|
|
114
115
|
@allowed_issuers.setter
|
115
|
-
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
116
|
+
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
116
117
|
pulumi.set(self, "allowed_issuers", value)
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter(name="allowedRoles")
|
120
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
121
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
121
122
|
"""
|
122
123
|
Specifies which roles are allowed for use with ACME.
|
123
124
|
"""
|
124
125
|
return pulumi.get(self, "allowed_roles")
|
125
126
|
|
126
127
|
@allowed_roles.setter
|
127
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
128
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
128
129
|
pulumi.set(self, "allowed_roles", value)
|
129
130
|
|
130
131
|
@property
|
131
132
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
132
|
-
def default_directory_policy(self) -> Optional[pulumi.Input[str]]:
|
133
|
+
def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
133
134
|
"""
|
134
135
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
135
136
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
@@ -137,12 +138,12 @@ class BackendConfigAcmeArgs:
|
|
137
138
|
return pulumi.get(self, "default_directory_policy")
|
138
139
|
|
139
140
|
@default_directory_policy.setter
|
140
|
-
def default_directory_policy(self, value: Optional[pulumi.Input[str]]):
|
141
|
+
def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
141
142
|
pulumi.set(self, "default_directory_policy", value)
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter(name="dnsResolver")
|
145
|
-
def dns_resolver(self) -> Optional[pulumi.Input[str]]:
|
146
|
+
def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
|
146
147
|
"""
|
147
148
|
DNS resolver to use for domain resolution on this mount.
|
148
149
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
@@ -150,12 +151,12 @@ class BackendConfigAcmeArgs:
|
|
150
151
|
return pulumi.get(self, "dns_resolver")
|
151
152
|
|
152
153
|
@dns_resolver.setter
|
153
|
-
def dns_resolver(self, value: Optional[pulumi.Input[str]]):
|
154
|
+
def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
|
154
155
|
pulumi.set(self, "dns_resolver", value)
|
155
156
|
|
156
157
|
@property
|
157
158
|
@pulumi.getter(name="eabPolicy")
|
158
|
-
def eab_policy(self) -> Optional[pulumi.Input[str]]:
|
159
|
+
def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
159
160
|
"""
|
160
161
|
Specifies the policy to use for external account binding behaviour.
|
161
162
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
@@ -163,24 +164,24 @@ class BackendConfigAcmeArgs:
|
|
163
164
|
return pulumi.get(self, "eab_policy")
|
164
165
|
|
165
166
|
@eab_policy.setter
|
166
|
-
def eab_policy(self, value: Optional[pulumi.Input[str]]):
|
167
|
+
def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
167
168
|
pulumi.set(self, "eab_policy", value)
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter(name="maxTtl")
|
171
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
172
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
172
173
|
"""
|
173
174
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
174
175
|
"""
|
175
176
|
return pulumi.get(self, "max_ttl")
|
176
177
|
|
177
178
|
@max_ttl.setter
|
178
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
179
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
179
180
|
pulumi.set(self, "max_ttl", value)
|
180
181
|
|
181
182
|
@property
|
182
183
|
@pulumi.getter
|
183
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
184
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
184
185
|
"""
|
185
186
|
The namespace to provision the resource in.
|
186
187
|
The value should not contain leading or trailing forward slashes.
|
@@ -190,38 +191,38 @@ class BackendConfigAcmeArgs:
|
|
190
191
|
return pulumi.get(self, "namespace")
|
191
192
|
|
192
193
|
@namespace.setter
|
193
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
194
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
194
195
|
pulumi.set(self, "namespace", value)
|
195
196
|
|
196
197
|
|
197
198
|
@pulumi.input_type
|
198
199
|
class _BackendConfigAcmeState:
|
199
200
|
def __init__(__self__, *,
|
200
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
|
201
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
202
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
203
|
-
backend: Optional[pulumi.Input[str]] = None,
|
204
|
-
default_directory_policy: Optional[pulumi.Input[str]] = None,
|
205
|
-
dns_resolver: Optional[pulumi.Input[str]] = None,
|
206
|
-
eab_policy: Optional[pulumi.Input[str]] = None,
|
207
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
208
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
209
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
201
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
|
202
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
203
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
204
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
205
|
+
default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
|
206
|
+
dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
|
207
|
+
eab_policy: Optional[pulumi.Input[builtins.str]] = None,
|
208
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
209
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
210
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
210
211
|
"""
|
211
212
|
Input properties used for looking up and filtering BackendConfigAcme resources.
|
212
|
-
:param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
213
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
214
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
215
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
216
|
-
:param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
213
|
+
:param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
214
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
215
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
216
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
217
|
+
:param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
217
218
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
218
|
-
:param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
219
|
+
:param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
219
220
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
220
|
-
:param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
221
|
+
:param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
221
222
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
222
|
-
:param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
|
223
|
-
:param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
224
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
223
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
|
224
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
225
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
225
226
|
The value should not contain leading or trailing forward slashes.
|
226
227
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
227
228
|
*Available only for Vault Enterprise*.
|
@@ -249,55 +250,55 @@ class _BackendConfigAcmeState:
|
|
249
250
|
|
250
251
|
@property
|
251
252
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
252
|
-
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[bool]]:
|
253
|
+
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
|
253
254
|
"""
|
254
255
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
255
256
|
"""
|
256
257
|
return pulumi.get(self, "allow_role_ext_key_usage")
|
257
258
|
|
258
259
|
@allow_role_ext_key_usage.setter
|
259
|
-
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[bool]]):
|
260
|
+
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
|
260
261
|
pulumi.set(self, "allow_role_ext_key_usage", value)
|
261
262
|
|
262
263
|
@property
|
263
264
|
@pulumi.getter(name="allowedIssuers")
|
264
|
-
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
265
|
+
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
265
266
|
"""
|
266
267
|
Specifies which issuers are allowed for use with ACME.
|
267
268
|
"""
|
268
269
|
return pulumi.get(self, "allowed_issuers")
|
269
270
|
|
270
271
|
@allowed_issuers.setter
|
271
|
-
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
272
|
+
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
272
273
|
pulumi.set(self, "allowed_issuers", value)
|
273
274
|
|
274
275
|
@property
|
275
276
|
@pulumi.getter(name="allowedRoles")
|
276
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
277
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
277
278
|
"""
|
278
279
|
Specifies which roles are allowed for use with ACME.
|
279
280
|
"""
|
280
281
|
return pulumi.get(self, "allowed_roles")
|
281
282
|
|
282
283
|
@allowed_roles.setter
|
283
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
284
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
284
285
|
pulumi.set(self, "allowed_roles", value)
|
285
286
|
|
286
287
|
@property
|
287
288
|
@pulumi.getter
|
288
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
289
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
289
290
|
"""
|
290
291
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
291
292
|
"""
|
292
293
|
return pulumi.get(self, "backend")
|
293
294
|
|
294
295
|
@backend.setter
|
295
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
296
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
296
297
|
pulumi.set(self, "backend", value)
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
300
|
-
def default_directory_policy(self) -> Optional[pulumi.Input[str]]:
|
301
|
+
def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
301
302
|
"""
|
302
303
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
303
304
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
@@ -305,12 +306,12 @@ class _BackendConfigAcmeState:
|
|
305
306
|
return pulumi.get(self, "default_directory_policy")
|
306
307
|
|
307
308
|
@default_directory_policy.setter
|
308
|
-
def default_directory_policy(self, value: Optional[pulumi.Input[str]]):
|
309
|
+
def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
309
310
|
pulumi.set(self, "default_directory_policy", value)
|
310
311
|
|
311
312
|
@property
|
312
313
|
@pulumi.getter(name="dnsResolver")
|
313
|
-
def dns_resolver(self) -> Optional[pulumi.Input[str]]:
|
314
|
+
def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
|
314
315
|
"""
|
315
316
|
DNS resolver to use for domain resolution on this mount.
|
316
317
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
@@ -318,12 +319,12 @@ class _BackendConfigAcmeState:
|
|
318
319
|
return pulumi.get(self, "dns_resolver")
|
319
320
|
|
320
321
|
@dns_resolver.setter
|
321
|
-
def dns_resolver(self, value: Optional[pulumi.Input[str]]):
|
322
|
+
def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
|
322
323
|
pulumi.set(self, "dns_resolver", value)
|
323
324
|
|
324
325
|
@property
|
325
326
|
@pulumi.getter(name="eabPolicy")
|
326
|
-
def eab_policy(self) -> Optional[pulumi.Input[str]]:
|
327
|
+
def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
327
328
|
"""
|
328
329
|
Specifies the policy to use for external account binding behaviour.
|
329
330
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
@@ -331,36 +332,36 @@ class _BackendConfigAcmeState:
|
|
331
332
|
return pulumi.get(self, "eab_policy")
|
332
333
|
|
333
334
|
@eab_policy.setter
|
334
|
-
def eab_policy(self, value: Optional[pulumi.Input[str]]):
|
335
|
+
def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
335
336
|
pulumi.set(self, "eab_policy", value)
|
336
337
|
|
337
338
|
@property
|
338
339
|
@pulumi.getter
|
339
|
-
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
340
|
+
def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
|
340
341
|
"""
|
341
342
|
Specifies whether ACME is enabled.
|
342
343
|
"""
|
343
344
|
return pulumi.get(self, "enabled")
|
344
345
|
|
345
346
|
@enabled.setter
|
346
|
-
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
347
|
+
def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
|
347
348
|
pulumi.set(self, "enabled", value)
|
348
349
|
|
349
350
|
@property
|
350
351
|
@pulumi.getter(name="maxTtl")
|
351
|
-
def max_ttl(self) -> Optional[pulumi.Input[int]]:
|
352
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
352
353
|
"""
|
353
354
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
354
355
|
"""
|
355
356
|
return pulumi.get(self, "max_ttl")
|
356
357
|
|
357
358
|
@max_ttl.setter
|
358
|
-
def max_ttl(self, value: Optional[pulumi.Input[int]]):
|
359
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
359
360
|
pulumi.set(self, "max_ttl", value)
|
360
361
|
|
361
362
|
@property
|
362
363
|
@pulumi.getter
|
363
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
364
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
364
365
|
"""
|
365
366
|
The namespace to provision the resource in.
|
366
367
|
The value should not contain leading or trailing forward slashes.
|
@@ -370,7 +371,7 @@ class _BackendConfigAcmeState:
|
|
370
371
|
return pulumi.get(self, "namespace")
|
371
372
|
|
372
373
|
@namespace.setter
|
373
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
374
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
374
375
|
pulumi.set(self, "namespace", value)
|
375
376
|
|
376
377
|
|
@@ -379,16 +380,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
379
380
|
def __init__(__self__,
|
380
381
|
resource_name: str,
|
381
382
|
opts: Optional[pulumi.ResourceOptions] = None,
|
382
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
|
383
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
384
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
385
|
-
backend: Optional[pulumi.Input[str]] = None,
|
386
|
-
default_directory_policy: Optional[pulumi.Input[str]] = None,
|
387
|
-
dns_resolver: Optional[pulumi.Input[str]] = None,
|
388
|
-
eab_policy: Optional[pulumi.Input[str]] = None,
|
389
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
390
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
391
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
383
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
|
384
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
385
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
386
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
387
|
+
default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
|
388
|
+
dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
|
389
|
+
eab_policy: Optional[pulumi.Input[builtins.str]] = None,
|
390
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
391
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
392
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
392
393
|
__props__=None):
|
393
394
|
"""
|
394
395
|
Allows setting the ACME server configuration used by specified mount.
|
@@ -431,19 +432,19 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
431
432
|
|
432
433
|
:param str resource_name: The name of the resource.
|
433
434
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
434
|
-
:param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
435
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
436
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
437
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
438
|
-
:param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
435
|
+
:param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
436
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
437
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
438
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
439
|
+
:param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
439
440
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
440
|
-
:param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
441
|
+
:param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
441
442
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
442
|
-
:param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
443
|
+
:param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
443
444
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
444
|
-
:param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
|
445
|
-
:param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
446
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
445
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
|
446
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
447
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
447
448
|
The value should not contain leading or trailing forward slashes.
|
448
449
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
449
450
|
*Available only for Vault Enterprise*.
|
@@ -508,16 +509,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
508
509
|
def _internal_init(__self__,
|
509
510
|
resource_name: str,
|
510
511
|
opts: Optional[pulumi.ResourceOptions] = None,
|
511
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
|
512
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
513
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
514
|
-
backend: Optional[pulumi.Input[str]] = None,
|
515
|
-
default_directory_policy: Optional[pulumi.Input[str]] = None,
|
516
|
-
dns_resolver: Optional[pulumi.Input[str]] = None,
|
517
|
-
eab_policy: Optional[pulumi.Input[str]] = None,
|
518
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
519
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
520
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
512
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
|
513
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
514
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
515
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
516
|
+
default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
|
517
|
+
dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
|
518
|
+
eab_policy: Optional[pulumi.Input[builtins.str]] = None,
|
519
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
520
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
521
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
521
522
|
__props__=None):
|
522
523
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
523
524
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -551,16 +552,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
551
552
|
def get(resource_name: str,
|
552
553
|
id: pulumi.Input[str],
|
553
554
|
opts: Optional[pulumi.ResourceOptions] = None,
|
554
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
|
555
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
556
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
557
|
-
backend: Optional[pulumi.Input[str]] = None,
|
558
|
-
default_directory_policy: Optional[pulumi.Input[str]] = None,
|
559
|
-
dns_resolver: Optional[pulumi.Input[str]] = None,
|
560
|
-
eab_policy: Optional[pulumi.Input[str]] = None,
|
561
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
562
|
-
max_ttl: Optional[pulumi.Input[int]] = None,
|
563
|
-
namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigAcme':
|
555
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
|
556
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
557
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
558
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
559
|
+
default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
|
560
|
+
dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
|
561
|
+
eab_policy: Optional[pulumi.Input[builtins.str]] = None,
|
562
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
563
|
+
max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
564
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigAcme':
|
564
565
|
"""
|
565
566
|
Get an existing BackendConfigAcme resource's state with the given name, id, and optional extra
|
566
567
|
properties used to qualify the lookup.
|
@@ -568,19 +569,19 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
568
569
|
:param str resource_name: The unique name of the resulting resource.
|
569
570
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
570
571
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
571
|
-
:param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
572
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
573
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
574
|
-
:param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
575
|
-
:param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
572
|
+
:param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
573
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
574
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
575
|
+
:param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
576
|
+
:param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
576
577
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
577
|
-
:param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
578
|
+
:param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
578
579
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
579
|
-
:param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
580
|
+
:param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
580
581
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
581
|
-
:param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
|
582
|
-
:param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
583
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
582
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
|
583
|
+
:param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
584
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
584
585
|
The value should not contain leading or trailing forward slashes.
|
585
586
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
586
587
|
*Available only for Vault Enterprise*.
|
@@ -603,7 +604,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
603
604
|
|
604
605
|
@property
|
605
606
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
606
|
-
def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[bool]]:
|
607
|
+
def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[builtins.bool]]:
|
607
608
|
"""
|
608
609
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
609
610
|
"""
|
@@ -611,7 +612,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
611
612
|
|
612
613
|
@property
|
613
614
|
@pulumi.getter(name="allowedIssuers")
|
614
|
-
def allowed_issuers(self) -> pulumi.Output[Sequence[str]]:
|
615
|
+
def allowed_issuers(self) -> pulumi.Output[Sequence[builtins.str]]:
|
615
616
|
"""
|
616
617
|
Specifies which issuers are allowed for use with ACME.
|
617
618
|
"""
|
@@ -619,7 +620,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
619
620
|
|
620
621
|
@property
|
621
622
|
@pulumi.getter(name="allowedRoles")
|
622
|
-
def allowed_roles(self) -> pulumi.Output[Sequence[str]]:
|
623
|
+
def allowed_roles(self) -> pulumi.Output[Sequence[builtins.str]]:
|
623
624
|
"""
|
624
625
|
Specifies which roles are allowed for use with ACME.
|
625
626
|
"""
|
@@ -627,7 +628,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
627
628
|
|
628
629
|
@property
|
629
630
|
@pulumi.getter
|
630
|
-
def backend(self) -> pulumi.Output[str]:
|
631
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
631
632
|
"""
|
632
633
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
633
634
|
"""
|
@@ -635,7 +636,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
635
636
|
|
636
637
|
@property
|
637
638
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
638
|
-
def default_directory_policy(self) -> pulumi.Output[str]:
|
639
|
+
def default_directory_policy(self) -> pulumi.Output[builtins.str]:
|
639
640
|
"""
|
640
641
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
641
642
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
@@ -644,7 +645,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
644
645
|
|
645
646
|
@property
|
646
647
|
@pulumi.getter(name="dnsResolver")
|
647
|
-
def dns_resolver(self) -> pulumi.Output[Optional[str]]:
|
648
|
+
def dns_resolver(self) -> pulumi.Output[Optional[builtins.str]]:
|
648
649
|
"""
|
649
650
|
DNS resolver to use for domain resolution on this mount.
|
650
651
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
@@ -653,7 +654,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
653
654
|
|
654
655
|
@property
|
655
656
|
@pulumi.getter(name="eabPolicy")
|
656
|
-
def eab_policy(self) -> pulumi.Output[str]:
|
657
|
+
def eab_policy(self) -> pulumi.Output[builtins.str]:
|
657
658
|
"""
|
658
659
|
Specifies the policy to use for external account binding behaviour.
|
659
660
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
@@ -662,7 +663,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
662
663
|
|
663
664
|
@property
|
664
665
|
@pulumi.getter
|
665
|
-
def enabled(self) -> pulumi.Output[bool]:
|
666
|
+
def enabled(self) -> pulumi.Output[builtins.bool]:
|
666
667
|
"""
|
667
668
|
Specifies whether ACME is enabled.
|
668
669
|
"""
|
@@ -670,7 +671,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
670
671
|
|
671
672
|
@property
|
672
673
|
@pulumi.getter(name="maxTtl")
|
673
|
-
def max_ttl(self) -> pulumi.Output[int]:
|
674
|
+
def max_ttl(self) -> pulumi.Output[builtins.int]:
|
674
675
|
"""
|
675
676
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
676
677
|
"""
|
@@ -678,7 +679,7 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
678
679
|
|
679
680
|
@property
|
680
681
|
@pulumi.getter
|
681
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
682
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
682
683
|
"""
|
683
684
|
The namespace to provision the resource in.
|
684
685
|
The value should not contain leading or trailing forward slashes.
|