pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -57,7 +58,7 @@ class GetBackendCertMetadataResult:
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter(name="certMetadata")
|
60
|
-
def cert_metadata(self) -> str:
|
61
|
+
def cert_metadata(self) -> builtins.str:
|
61
62
|
"""
|
62
63
|
The metadata associated with the certificate
|
63
64
|
"""
|
@@ -65,7 +66,7 @@ class GetBackendCertMetadataResult:
|
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter
|
68
|
-
def expiration(self) -> str:
|
69
|
+
def expiration(self) -> builtins.str:
|
69
70
|
"""
|
70
71
|
The expiration date of the certificate in unix epoch format
|
71
72
|
"""
|
@@ -73,7 +74,7 @@ class GetBackendCertMetadataResult:
|
|
73
74
|
|
74
75
|
@property
|
75
76
|
@pulumi.getter
|
76
|
-
def id(self) -> str:
|
77
|
+
def id(self) -> builtins.str:
|
77
78
|
"""
|
78
79
|
The provider-assigned unique ID for this managed resource.
|
79
80
|
"""
|
@@ -81,7 +82,7 @@ class GetBackendCertMetadataResult:
|
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter(name="issuerId")
|
84
|
-
def issuer_id(self) -> str:
|
85
|
+
def issuer_id(self) -> builtins.str:
|
85
86
|
"""
|
86
87
|
ID of the issuer.
|
87
88
|
"""
|
@@ -89,17 +90,17 @@ class GetBackendCertMetadataResult:
|
|
89
90
|
|
90
91
|
@property
|
91
92
|
@pulumi.getter
|
92
|
-
def namespace(self) -> Optional[str]:
|
93
|
+
def namespace(self) -> Optional[builtins.str]:
|
93
94
|
return pulumi.get(self, "namespace")
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter
|
97
|
-
def path(self) -> str:
|
98
|
+
def path(self) -> builtins.str:
|
98
99
|
return pulumi.get(self, "path")
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter
|
102
|
-
def role(self) -> str:
|
103
|
+
def role(self) -> builtins.str:
|
103
104
|
"""
|
104
105
|
The role used to create the certificate
|
105
106
|
"""
|
@@ -107,12 +108,12 @@ class GetBackendCertMetadataResult:
|
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def serial(self) -> str:
|
111
|
+
def serial(self) -> builtins.str:
|
111
112
|
return pulumi.get(self, "serial")
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter(name="serialNumber")
|
115
|
-
def serial_number(self) -> str:
|
116
|
+
def serial_number(self) -> builtins.str:
|
116
117
|
"""
|
117
118
|
The serial number
|
118
119
|
"""
|
@@ -136,9 +137,9 @@ class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
|
|
136
137
|
serial_number=self.serial_number)
|
137
138
|
|
138
139
|
|
139
|
-
def get_backend_cert_metadata(namespace: Optional[str] = None,
|
140
|
-
path: Optional[str] = None,
|
141
|
-
serial: Optional[str] = None,
|
140
|
+
def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
|
141
|
+
path: Optional[builtins.str] = None,
|
142
|
+
serial: Optional[builtins.str] = None,
|
142
143
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
|
143
144
|
"""
|
144
145
|
## Example Usage
|
@@ -181,13 +182,13 @@ def get_backend_cert_metadata(namespace: Optional[str] = None,
|
|
181
182
|
```
|
182
183
|
|
183
184
|
|
184
|
-
:param str namespace: The namespace of the target resource.
|
185
|
+
:param builtins.str namespace: The namespace of the target resource.
|
185
186
|
The value should not contain leading or trailing forward slashes.
|
186
187
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
187
188
|
*Available only for Vault Enterprise*.
|
188
|
-
:param str path: The path to the PKI secret backend to
|
189
|
+
:param builtins.str path: The path to the PKI secret backend to
|
189
190
|
read the cert metadata from, with no leading or trailing `/`s.
|
190
|
-
:param str serial: Specifies the serial of the certificate whose metadata to read.
|
191
|
+
:param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
|
191
192
|
"""
|
192
193
|
__args__ = dict()
|
193
194
|
__args__['namespace'] = namespace
|
@@ -206,9 +207,9 @@ def get_backend_cert_metadata(namespace: Optional[str] = None,
|
|
206
207
|
role=pulumi.get(__ret__, 'role'),
|
207
208
|
serial=pulumi.get(__ret__, 'serial'),
|
208
209
|
serial_number=pulumi.get(__ret__, 'serial_number'))
|
209
|
-
def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
210
|
-
path: Optional[pulumi.Input[str]] = None,
|
211
|
-
serial: Optional[pulumi.Input[str]] = None,
|
210
|
+
def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
211
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
212
|
+
serial: Optional[pulumi.Input[builtins.str]] = None,
|
212
213
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
|
213
214
|
"""
|
214
215
|
## Example Usage
|
@@ -251,13 +252,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[s
|
|
251
252
|
```
|
252
253
|
|
253
254
|
|
254
|
-
:param str namespace: The namespace of the target resource.
|
255
|
+
:param builtins.str namespace: The namespace of the target resource.
|
255
256
|
The value should not contain leading or trailing forward slashes.
|
256
257
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
257
258
|
*Available only for Vault Enterprise*.
|
258
|
-
:param str path: The path to the PKI secret backend to
|
259
|
+
:param builtins.str path: The path to the PKI secret backend to
|
259
260
|
read the cert metadata from, with no leading or trailing `/`s.
|
260
|
-
:param str serial: Specifies the serial of the certificate whose metadata to read.
|
261
|
+
:param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
|
261
262
|
"""
|
262
263
|
__args__ = dict()
|
263
264
|
__args__['namespace'] = namespace
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -61,7 +62,7 @@ class GetBackendConfigCmpv2Result:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter(name="auditFields")
|
64
|
-
def audit_fields(self) -> Sequence[str]:
|
65
|
+
def audit_fields(self) -> Sequence[builtins.str]:
|
65
66
|
return pulumi.get(self, "audit_fields")
|
66
67
|
|
67
68
|
@property
|
@@ -71,32 +72,32 @@ class GetBackendConfigCmpv2Result:
|
|
71
72
|
|
72
73
|
@property
|
73
74
|
@pulumi.getter
|
74
|
-
def backend(self) -> str:
|
75
|
+
def backend(self) -> builtins.str:
|
75
76
|
return pulumi.get(self, "backend")
|
76
77
|
|
77
78
|
@property
|
78
79
|
@pulumi.getter(name="defaultPathPolicy")
|
79
|
-
def default_path_policy(self) -> str:
|
80
|
+
def default_path_policy(self) -> builtins.str:
|
80
81
|
return pulumi.get(self, "default_path_policy")
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter(name="disabledValidations")
|
84
|
-
def disabled_validations(self) -> Optional[Sequence[str]]:
|
85
|
+
def disabled_validations(self) -> Optional[Sequence[builtins.str]]:
|
85
86
|
return pulumi.get(self, "disabled_validations")
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="enableSentinelParsing")
|
89
|
-
def enable_sentinel_parsing(self) -> bool:
|
90
|
+
def enable_sentinel_parsing(self) -> builtins.bool:
|
90
91
|
return pulumi.get(self, "enable_sentinel_parsing")
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def enabled(self) -> bool:
|
95
|
+
def enabled(self) -> builtins.bool:
|
95
96
|
return pulumi.get(self, "enabled")
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter
|
99
|
-
def id(self) -> str:
|
100
|
+
def id(self) -> builtins.str:
|
100
101
|
"""
|
101
102
|
The provider-assigned unique ID for this managed resource.
|
102
103
|
"""
|
@@ -104,12 +105,12 @@ class GetBackendConfigCmpv2Result:
|
|
104
105
|
|
105
106
|
@property
|
106
107
|
@pulumi.getter(name="lastUpdated")
|
107
|
-
def last_updated(self) -> str:
|
108
|
+
def last_updated(self) -> builtins.str:
|
108
109
|
return pulumi.get(self, "last_updated")
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def namespace(self) -> Optional[str]:
|
113
|
+
def namespace(self) -> Optional[builtins.str]:
|
113
114
|
return pulumi.get(self, "namespace")
|
114
115
|
|
115
116
|
|
@@ -131,9 +132,9 @@ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
|
|
131
132
|
namespace=self.namespace)
|
132
133
|
|
133
134
|
|
134
|
-
def get_backend_config_cmpv2(backend: Optional[str] = None,
|
135
|
-
disabled_validations: Optional[Sequence[str]] = None,
|
136
|
-
namespace: Optional[str] = None,
|
135
|
+
def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
|
136
|
+
disabled_validations: Optional[Sequence[builtins.str]] = None,
|
137
|
+
namespace: Optional[builtins.str] = None,
|
137
138
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
|
138
139
|
"""
|
139
140
|
## Example Usage
|
@@ -150,12 +151,12 @@ def get_backend_config_cmpv2(backend: Optional[str] = None,
|
|
150
151
|
```
|
151
152
|
|
152
153
|
|
153
|
-
:param str backend: The path to the PKI secret backend to
|
154
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
154
155
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
155
156
|
|
156
157
|
# Attributes Reference
|
157
|
-
:param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
158
|
-
:param str namespace: The namespace of the target resource.
|
158
|
+
:param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
159
|
+
:param builtins.str namespace: The namespace of the target resource.
|
159
160
|
The value should not contain leading or trailing forward slashes.
|
160
161
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
162
|
*Available only for Vault Enterprise*.
|
@@ -178,9 +179,9 @@ def get_backend_config_cmpv2(backend: Optional[str] = None,
|
|
178
179
|
id=pulumi.get(__ret__, 'id'),
|
179
180
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
180
181
|
namespace=pulumi.get(__ret__, 'namespace'))
|
181
|
-
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
|
182
|
-
disabled_validations: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
183
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
182
|
+
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
183
|
+
disabled_validations: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
|
184
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
184
185
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
|
185
186
|
"""
|
186
187
|
## Example Usage
|
@@ -197,12 +198,12 @@ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
|
|
197
198
|
```
|
198
199
|
|
199
200
|
|
200
|
-
:param str backend: The path to the PKI secret backend to
|
201
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
201
202
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
202
203
|
|
203
204
|
# Attributes Reference
|
204
|
-
:param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
205
|
-
:param str namespace: The namespace of the target resource.
|
205
|
+
:param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
206
|
+
:param builtins.str namespace: The namespace of the target resource.
|
206
207
|
The value should not contain leading or trailing forward slashes.
|
207
208
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
208
209
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -64,7 +65,7 @@ class GetBackendConfigEstResult:
|
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter(name="auditFields")
|
67
|
-
def audit_fields(self) -> Sequence[str]:
|
68
|
+
def audit_fields(self) -> Sequence[builtins.str]:
|
68
69
|
"""
|
69
70
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
70
71
|
"""
|
@@ -80,12 +81,12 @@ class GetBackendConfigEstResult:
|
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter
|
83
|
-
def backend(self) -> str:
|
84
|
+
def backend(self) -> builtins.str:
|
84
85
|
return pulumi.get(self, "backend")
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="defaultMount")
|
88
|
-
def default_mount(self) -> bool:
|
89
|
+
def default_mount(self) -> builtins.bool:
|
89
90
|
"""
|
90
91
|
If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
91
92
|
"""
|
@@ -93,7 +94,7 @@ class GetBackendConfigEstResult:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter(name="defaultPathPolicy")
|
96
|
-
def default_path_policy(self) -> str:
|
97
|
+
def default_path_policy(self) -> builtins.str:
|
97
98
|
"""
|
98
99
|
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
99
100
|
"""
|
@@ -101,7 +102,7 @@ class GetBackendConfigEstResult:
|
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter(name="enableSentinelParsing")
|
104
|
-
def enable_sentinel_parsing(self) -> bool:
|
105
|
+
def enable_sentinel_parsing(self) -> builtins.bool:
|
105
106
|
"""
|
106
107
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
107
108
|
"""
|
@@ -109,7 +110,7 @@ class GetBackendConfigEstResult:
|
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def enabled(self) -> bool:
|
113
|
+
def enabled(self) -> builtins.bool:
|
113
114
|
"""
|
114
115
|
Specifies whether EST is enabled.
|
115
116
|
"""
|
@@ -117,7 +118,7 @@ class GetBackendConfigEstResult:
|
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter
|
120
|
-
def id(self) -> str:
|
121
|
+
def id(self) -> builtins.str:
|
121
122
|
"""
|
122
123
|
The provider-assigned unique ID for this managed resource.
|
123
124
|
"""
|
@@ -125,7 +126,7 @@ class GetBackendConfigEstResult:
|
|
125
126
|
|
126
127
|
@property
|
127
128
|
@pulumi.getter(name="labelToPathPolicy")
|
128
|
-
def label_to_path_policy(self) -> Mapping[str, str]:
|
129
|
+
def label_to_path_policy(self) -> Mapping[str, builtins.str]:
|
129
130
|
"""
|
130
131
|
A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
131
132
|
"""
|
@@ -133,7 +134,7 @@ class GetBackendConfigEstResult:
|
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter(name="lastUpdated")
|
136
|
-
def last_updated(self) -> str:
|
137
|
+
def last_updated(self) -> builtins.str:
|
137
138
|
"""
|
138
139
|
A read-only timestamp representing the last time the configuration was updated.
|
139
140
|
"""
|
@@ -141,7 +142,7 @@ class GetBackendConfigEstResult:
|
|
141
142
|
|
142
143
|
@property
|
143
144
|
@pulumi.getter
|
144
|
-
def namespace(self) -> Optional[str]:
|
145
|
+
def namespace(self) -> Optional[builtins.str]:
|
145
146
|
return pulumi.get(self, "namespace")
|
146
147
|
|
147
148
|
|
@@ -164,8 +165,8 @@ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
|
|
164
165
|
namespace=self.namespace)
|
165
166
|
|
166
167
|
|
167
|
-
def get_backend_config_est(backend: Optional[str] = None,
|
168
|
-
namespace: Optional[str] = None,
|
168
|
+
def get_backend_config_est(backend: Optional[builtins.str] = None,
|
169
|
+
namespace: Optional[builtins.str] = None,
|
169
170
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
|
170
171
|
"""
|
171
172
|
## Example Usage
|
@@ -182,9 +183,9 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
182
183
|
```
|
183
184
|
|
184
185
|
|
185
|
-
:param str backend: The path to the PKI secret backend to
|
186
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
186
187
|
read the EST configuration from, with no leading or trailing `/`s.
|
187
|
-
:param str namespace: The namespace of the target resource.
|
188
|
+
:param builtins.str namespace: The namespace of the target resource.
|
188
189
|
The value should not contain leading or trailing forward slashes.
|
189
190
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
190
191
|
*Available only for Vault Enterprise*.
|
@@ -207,8 +208,8 @@ def get_backend_config_est(backend: Optional[str] = None,
|
|
207
208
|
label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
|
208
209
|
last_updated=pulumi.get(__ret__, 'last_updated'),
|
209
210
|
namespace=pulumi.get(__ret__, 'namespace'))
|
210
|
-
def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
211
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
211
|
+
def get_backend_config_est_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
212
213
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
|
213
214
|
"""
|
214
215
|
## Example Usage
|
@@ -225,9 +226,9 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
|
|
225
226
|
```
|
226
227
|
|
227
228
|
|
228
|
-
:param str backend: The path to the PKI secret backend to
|
229
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
229
230
|
read the EST configuration from, with no leading or trailing `/`s.
|
230
|
-
:param str namespace: The namespace of the target resource.
|
231
|
+
:param builtins.str namespace: The namespace of the target resource.
|
231
232
|
The value should not contain leading or trailing forward slashes.
|
232
233
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
234
|
*Available only for Vault Enterprise*.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -78,12 +79,12 @@ class GetBackendIssuerResult:
|
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def backend(self) -> str:
|
82
|
+
def backend(self) -> builtins.str:
|
82
83
|
return pulumi.get(self, "backend")
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter(name="caChains")
|
86
|
-
def ca_chains(self) -> Sequence[str]:
|
87
|
+
def ca_chains(self) -> Sequence[builtins.str]:
|
87
88
|
"""
|
88
89
|
The CA chain as a list of format specific certificates.
|
89
90
|
"""
|
@@ -91,7 +92,7 @@ class GetBackendIssuerResult:
|
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def certificate(self) -> str:
|
95
|
+
def certificate(self) -> builtins.str:
|
95
96
|
"""
|
96
97
|
Certificate associated with this issuer.
|
97
98
|
"""
|
@@ -99,7 +100,7 @@ class GetBackendIssuerResult:
|
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
102
|
-
def disable_critical_extension_checks(self) -> Optional[bool]:
|
103
|
+
def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
|
103
104
|
"""
|
104
105
|
This determines whether this
|
105
106
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -109,7 +110,7 @@ class GetBackendIssuerResult:
|
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter(name="disableNameChecks")
|
112
|
-
def disable_name_checks(self) -> Optional[bool]:
|
113
|
+
def disable_name_checks(self) -> Optional[builtins.bool]:
|
113
114
|
"""
|
114
115
|
This determines whether this issuer is able
|
115
116
|
to issue certificates where the chain of trust (including the final issued
|
@@ -120,7 +121,7 @@ class GetBackendIssuerResult:
|
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter(name="disableNameConstraintChecks")
|
123
|
-
def disable_name_constraint_checks(self) -> Optional[bool]:
|
124
|
+
def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
|
124
125
|
"""
|
125
126
|
This determines whether this
|
126
127
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -131,7 +132,7 @@ class GetBackendIssuerResult:
|
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter(name="disablePathLengthChecks")
|
134
|
-
def disable_path_length_checks(self) -> Optional[bool]:
|
135
|
+
def disable_path_length_checks(self) -> Optional[builtins.bool]:
|
135
136
|
"""
|
136
137
|
This determines whether this issuer
|
137
138
|
is able to issue certificates where the chain of trust (including the final
|
@@ -142,7 +143,7 @@ class GetBackendIssuerResult:
|
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter
|
145
|
-
def id(self) -> str:
|
146
|
+
def id(self) -> builtins.str:
|
146
147
|
"""
|
147
148
|
The provider-assigned unique ID for this managed resource.
|
148
149
|
"""
|
@@ -150,7 +151,7 @@ class GetBackendIssuerResult:
|
|
150
151
|
|
151
152
|
@property
|
152
153
|
@pulumi.getter(name="issuerId")
|
153
|
-
def issuer_id(self) -> str:
|
154
|
+
def issuer_id(self) -> builtins.str:
|
154
155
|
"""
|
155
156
|
ID of the issuer.
|
156
157
|
"""
|
@@ -158,7 +159,7 @@ class GetBackendIssuerResult:
|
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter(name="issuerName")
|
161
|
-
def issuer_name(self) -> str:
|
162
|
+
def issuer_name(self) -> builtins.str:
|
162
163
|
"""
|
163
164
|
Name of the issuer.
|
164
165
|
"""
|
@@ -166,12 +167,12 @@ class GetBackendIssuerResult:
|
|
166
167
|
|
167
168
|
@property
|
168
169
|
@pulumi.getter(name="issuerRef")
|
169
|
-
def issuer_ref(self) -> str:
|
170
|
+
def issuer_ref(self) -> builtins.str:
|
170
171
|
return pulumi.get(self, "issuer_ref")
|
171
172
|
|
172
173
|
@property
|
173
174
|
@pulumi.getter(name="keyId")
|
174
|
-
def key_id(self) -> str:
|
175
|
+
def key_id(self) -> builtins.str:
|
175
176
|
"""
|
176
177
|
ID of the key used by the issuer.
|
177
178
|
"""
|
@@ -179,7 +180,7 @@ class GetBackendIssuerResult:
|
|
179
180
|
|
180
181
|
@property
|
181
182
|
@pulumi.getter(name="leafNotAfterBehavior")
|
182
|
-
def leaf_not_after_behavior(self) -> str:
|
183
|
+
def leaf_not_after_behavior(self) -> builtins.str:
|
183
184
|
"""
|
184
185
|
Behavior of a leaf's NotAfter field during issuance.
|
185
186
|
"""
|
@@ -187,7 +188,7 @@ class GetBackendIssuerResult:
|
|
187
188
|
|
188
189
|
@property
|
189
190
|
@pulumi.getter(name="manualChains")
|
190
|
-
def manual_chains(self) -> Sequence[str]:
|
191
|
+
def manual_chains(self) -> Sequence[builtins.str]:
|
191
192
|
"""
|
192
193
|
Chain of issuer references to build this issuer's computed
|
193
194
|
CAChain field from, when non-empty.
|
@@ -196,12 +197,12 @@ class GetBackendIssuerResult:
|
|
196
197
|
|
197
198
|
@property
|
198
199
|
@pulumi.getter
|
199
|
-
def namespace(self) -> Optional[str]:
|
200
|
+
def namespace(self) -> Optional[builtins.str]:
|
200
201
|
return pulumi.get(self, "namespace")
|
201
202
|
|
202
203
|
@property
|
203
204
|
@pulumi.getter
|
204
|
-
def usage(self) -> str:
|
205
|
+
def usage(self) -> builtins.str:
|
205
206
|
"""
|
206
207
|
Allowed usages for this issuer.
|
207
208
|
"""
|
@@ -232,13 +233,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
|
|
232
233
|
usage=self.usage)
|
233
234
|
|
234
235
|
|
235
|
-
def get_backend_issuer(backend: Optional[str] = None,
|
236
|
-
disable_critical_extension_checks: Optional[bool] = None,
|
237
|
-
disable_name_checks: Optional[bool] = None,
|
238
|
-
disable_name_constraint_checks: Optional[bool] = None,
|
239
|
-
disable_path_length_checks: Optional[bool] = None,
|
240
|
-
issuer_ref: Optional[str] = None,
|
241
|
-
namespace: Optional[str] = None,
|
236
|
+
def get_backend_issuer(backend: Optional[builtins.str] = None,
|
237
|
+
disable_critical_extension_checks: Optional[builtins.bool] = None,
|
238
|
+
disable_name_checks: Optional[builtins.bool] = None,
|
239
|
+
disable_name_constraint_checks: Optional[builtins.bool] = None,
|
240
|
+
disable_path_length_checks: Optional[builtins.bool] = None,
|
241
|
+
issuer_ref: Optional[builtins.str] = None,
|
242
|
+
namespace: Optional[builtins.str] = None,
|
242
243
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
|
243
244
|
"""
|
244
245
|
## Example Usage
|
@@ -262,25 +263,25 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
262
263
|
```
|
263
264
|
|
264
265
|
|
265
|
-
:param str backend: The path to the PKI secret backend to
|
266
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
266
267
|
read the issuer from, with no leading or trailing `/`s.
|
267
|
-
:param bool disable_critical_extension_checks: This determines whether this
|
268
|
+
:param builtins.bool disable_critical_extension_checks: This determines whether this
|
268
269
|
issuer is able to issue certificates where the chain of trust (including the
|
269
270
|
issued certificate) contain critical extensions not processed by Vault.
|
270
|
-
:param bool disable_name_checks: This determines whether this issuer is able
|
271
|
+
:param builtins.bool disable_name_checks: This determines whether this issuer is able
|
271
272
|
to issue certificates where the chain of trust (including the final issued
|
272
273
|
certificate) contains a link in which the subject of the issuing certificate
|
273
274
|
does not match the named issuer of the certificate it signed.
|
274
|
-
:param bool disable_name_constraint_checks: This determines whether this
|
275
|
+
:param builtins.bool disable_name_constraint_checks: This determines whether this
|
275
276
|
issuer is able to issue certificates where the chain of trust (including the
|
276
277
|
final issued certificate) violates the name constraints critical extension of
|
277
278
|
one of the issuer certificates in the chain.
|
278
|
-
:param bool disable_path_length_checks: This determines whether this issuer
|
279
|
+
:param builtins.bool disable_path_length_checks: This determines whether this issuer
|
279
280
|
is able to issue certificates where the chain of trust (including the final
|
280
281
|
issued certificate) is longer than allowed by a certificate authority in that
|
281
282
|
chain.
|
282
|
-
:param str issuer_ref: Reference to an existing issuer.
|
283
|
-
:param str namespace: The namespace of the target resource.
|
283
|
+
:param builtins.str issuer_ref: Reference to an existing issuer.
|
284
|
+
:param builtins.str namespace: The namespace of the target resource.
|
284
285
|
The value should not contain leading or trailing forward slashes.
|
285
286
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
286
287
|
*Available only for Vault Enterprise*.
|
@@ -313,13 +314,13 @@ def get_backend_issuer(backend: Optional[str] = None,
|
|
313
314
|
manual_chains=pulumi.get(__ret__, 'manual_chains'),
|
314
315
|
namespace=pulumi.get(__ret__, 'namespace'),
|
315
316
|
usage=pulumi.get(__ret__, 'usage'))
|
316
|
-
def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
317
|
-
disable_critical_extension_checks: Optional[pulumi.Input[Optional[bool]]] = None,
|
318
|
-
disable_name_checks: Optional[pulumi.Input[Optional[bool]]] = None,
|
319
|
-
disable_name_constraint_checks: Optional[pulumi.Input[Optional[bool]]] = None,
|
320
|
-
disable_path_length_checks: Optional[pulumi.Input[Optional[bool]]] = None,
|
321
|
-
issuer_ref: Optional[pulumi.Input[str]] = None,
|
322
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
317
|
+
def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
318
|
+
disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
319
|
+
disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
320
|
+
disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
321
|
+
disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
322
|
+
issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
|
323
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
323
324
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
|
324
325
|
"""
|
325
326
|
## Example Usage
|
@@ -343,25 +344,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
|
|
343
344
|
```
|
344
345
|
|
345
346
|
|
346
|
-
:param str backend: The path to the PKI secret backend to
|
347
|
+
:param builtins.str backend: The path to the PKI secret backend to
|
347
348
|
read the issuer from, with no leading or trailing `/`s.
|
348
|
-
:param bool disable_critical_extension_checks: This determines whether this
|
349
|
+
:param builtins.bool disable_critical_extension_checks: This determines whether this
|
349
350
|
issuer is able to issue certificates where the chain of trust (including the
|
350
351
|
issued certificate) contain critical extensions not processed by Vault.
|
351
|
-
:param bool disable_name_checks: This determines whether this issuer is able
|
352
|
+
:param builtins.bool disable_name_checks: This determines whether this issuer is able
|
352
353
|
to issue certificates where the chain of trust (including the final issued
|
353
354
|
certificate) contains a link in which the subject of the issuing certificate
|
354
355
|
does not match the named issuer of the certificate it signed.
|
355
|
-
:param bool disable_name_constraint_checks: This determines whether this
|
356
|
+
:param builtins.bool disable_name_constraint_checks: This determines whether this
|
356
357
|
issuer is able to issue certificates where the chain of trust (including the
|
357
358
|
final issued certificate) violates the name constraints critical extension of
|
358
359
|
one of the issuer certificates in the chain.
|
359
|
-
:param bool disable_path_length_checks: This determines whether this issuer
|
360
|
+
:param builtins.bool disable_path_length_checks: This determines whether this issuer
|
360
361
|
is able to issue certificates where the chain of trust (including the final
|
361
362
|
issued certificate) is longer than allowed by a certificate authority in that
|
362
363
|
chain.
|
363
|
-
:param str issuer_ref: Reference to an existing issuer.
|
364
|
-
:param str namespace: The namespace of the target resource.
|
364
|
+
:param builtins.str issuer_ref: Reference to an existing issuer.
|
365
|
+
:param builtins.str namespace: The namespace of the target resource.
|
365
366
|
The value should not contain leading or trailing forward slashes.
|
366
367
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
367
368
|
*Available only for Vault Enterprise*.
|