pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,31 +19,31 @@ __all__ = ['BackendConfigAcmeArgs', 'BackendConfigAcme']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class BackendConfigAcmeArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
enabled: pulumi.Input[
|
25
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[
|
26
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
default_directory_policy: Optional[pulumi.Input[
|
29
|
-
dns_resolver: Optional[pulumi.Input[
|
30
|
-
eab_policy: Optional[pulumi.Input[
|
31
|
-
max_ttl: Optional[pulumi.Input[
|
32
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
enabled: pulumi.Input[_builtins.bool],
|
24
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
33
32
|
"""
|
34
33
|
The set of arguments for constructing a BackendConfigAcme resource.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
35
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
|
36
|
+
:param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
39
|
+
:param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
41
40
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
43
42
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
45
44
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
46
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
48
47
|
The value should not contain leading or trailing forward slashes.
|
49
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
50
49
|
*Available only for Vault Enterprise*.
|
@@ -68,69 +67,69 @@ class BackendConfigAcmeArgs:
|
|
68
67
|
if namespace is not None:
|
69
68
|
pulumi.set(__self__, "namespace", namespace)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def backend(self) -> pulumi.Input[
|
72
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
74
73
|
"""
|
75
74
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "backend")
|
78
77
|
|
79
78
|
@backend.setter
|
80
|
-
def backend(self, value: pulumi.Input[
|
79
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
81
80
|
pulumi.set(self, "backend", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def enabled(self) -> pulumi.Input[
|
84
|
+
def enabled(self) -> pulumi.Input[_builtins.bool]:
|
86
85
|
"""
|
87
86
|
Specifies whether ACME is enabled.
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "enabled")
|
90
89
|
|
91
90
|
@enabled.setter
|
92
|
-
def enabled(self, value: pulumi.Input[
|
91
|
+
def enabled(self, value: pulumi.Input[_builtins.bool]):
|
93
92
|
pulumi.set(self, "enabled", value)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
97
|
-
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[
|
96
|
+
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
98
97
|
"""
|
99
98
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
100
99
|
"""
|
101
100
|
return pulumi.get(self, "allow_role_ext_key_usage")
|
102
101
|
|
103
102
|
@allow_role_ext_key_usage.setter
|
104
|
-
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[
|
103
|
+
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
105
104
|
pulumi.set(self, "allow_role_ext_key_usage", value)
|
106
105
|
|
107
|
-
@property
|
106
|
+
@_builtins.property
|
108
107
|
@pulumi.getter(name="allowedIssuers")
|
109
|
-
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
108
|
+
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
110
109
|
"""
|
111
110
|
Specifies which issuers are allowed for use with ACME.
|
112
111
|
"""
|
113
112
|
return pulumi.get(self, "allowed_issuers")
|
114
113
|
|
115
114
|
@allowed_issuers.setter
|
116
|
-
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
115
|
+
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
117
116
|
pulumi.set(self, "allowed_issuers", value)
|
118
117
|
|
119
|
-
@property
|
118
|
+
@_builtins.property
|
120
119
|
@pulumi.getter(name="allowedRoles")
|
121
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
120
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
122
121
|
"""
|
123
122
|
Specifies which roles are allowed for use with ACME.
|
124
123
|
"""
|
125
124
|
return pulumi.get(self, "allowed_roles")
|
126
125
|
|
127
126
|
@allowed_roles.setter
|
128
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
127
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
129
128
|
pulumi.set(self, "allowed_roles", value)
|
130
129
|
|
131
|
-
@property
|
130
|
+
@_builtins.property
|
132
131
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
133
|
-
def default_directory_policy(self) -> Optional[pulumi.Input[
|
132
|
+
def default_directory_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
134
133
|
"""
|
135
134
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
136
135
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
@@ -138,12 +137,12 @@ class BackendConfigAcmeArgs:
|
|
138
137
|
return pulumi.get(self, "default_directory_policy")
|
139
138
|
|
140
139
|
@default_directory_policy.setter
|
141
|
-
def default_directory_policy(self, value: Optional[pulumi.Input[
|
140
|
+
def default_directory_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
142
141
|
pulumi.set(self, "default_directory_policy", value)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter(name="dnsResolver")
|
146
|
-
def dns_resolver(self) -> Optional[pulumi.Input[
|
145
|
+
def dns_resolver(self) -> Optional[pulumi.Input[_builtins.str]]:
|
147
146
|
"""
|
148
147
|
DNS resolver to use for domain resolution on this mount.
|
149
148
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
@@ -151,12 +150,12 @@ class BackendConfigAcmeArgs:
|
|
151
150
|
return pulumi.get(self, "dns_resolver")
|
152
151
|
|
153
152
|
@dns_resolver.setter
|
154
|
-
def dns_resolver(self, value: Optional[pulumi.Input[
|
153
|
+
def dns_resolver(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "dns_resolver", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter(name="eabPolicy")
|
159
|
-
def eab_policy(self) -> Optional[pulumi.Input[
|
158
|
+
def eab_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
160
159
|
"""
|
161
160
|
Specifies the policy to use for external account binding behaviour.
|
162
161
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
@@ -164,24 +163,24 @@ class BackendConfigAcmeArgs:
|
|
164
163
|
return pulumi.get(self, "eab_policy")
|
165
164
|
|
166
165
|
@eab_policy.setter
|
167
|
-
def eab_policy(self, value: Optional[pulumi.Input[
|
166
|
+
def eab_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
168
167
|
pulumi.set(self, "eab_policy", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter(name="maxTtl")
|
172
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
171
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
173
172
|
"""
|
174
173
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "max_ttl")
|
177
176
|
|
178
177
|
@max_ttl.setter
|
179
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
178
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
180
179
|
pulumi.set(self, "max_ttl", value)
|
181
180
|
|
182
|
-
@property
|
181
|
+
@_builtins.property
|
183
182
|
@pulumi.getter
|
184
|
-
def namespace(self) -> Optional[pulumi.Input[
|
183
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
185
184
|
"""
|
186
185
|
The namespace to provision the resource in.
|
187
186
|
The value should not contain leading or trailing forward slashes.
|
@@ -191,38 +190,38 @@ class BackendConfigAcmeArgs:
|
|
191
190
|
return pulumi.get(self, "namespace")
|
192
191
|
|
193
192
|
@namespace.setter
|
194
|
-
def namespace(self, value: Optional[pulumi.Input[
|
193
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
195
194
|
pulumi.set(self, "namespace", value)
|
196
195
|
|
197
196
|
|
198
197
|
@pulumi.input_type
|
199
198
|
class _BackendConfigAcmeState:
|
200
199
|
def __init__(__self__, *,
|
201
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[
|
202
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
203
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
204
|
-
backend: Optional[pulumi.Input[
|
205
|
-
default_directory_policy: Optional[pulumi.Input[
|
206
|
-
dns_resolver: Optional[pulumi.Input[
|
207
|
-
eab_policy: Optional[pulumi.Input[
|
208
|
-
enabled: Optional[pulumi.Input[
|
209
|
-
max_ttl: Optional[pulumi.Input[
|
210
|
-
namespace: Optional[pulumi.Input[
|
200
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
|
201
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
202
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
203
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
204
|
+
default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
205
|
+
dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
|
206
|
+
eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
207
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
208
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
209
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
211
210
|
"""
|
212
211
|
Input properties used for looking up and filtering BackendConfigAcme resources.
|
213
|
-
:param pulumi.Input[
|
214
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
215
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
216
|
-
:param pulumi.Input[
|
217
|
-
:param pulumi.Input[
|
212
|
+
:param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
213
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
214
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
215
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
216
|
+
:param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
218
217
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
219
|
-
:param pulumi.Input[
|
218
|
+
:param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
220
219
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
221
|
-
:param pulumi.Input[
|
220
|
+
:param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
222
221
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
223
|
-
:param pulumi.Input[
|
224
|
-
:param pulumi.Input[
|
225
|
-
:param pulumi.Input[
|
222
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
|
223
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
224
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
226
225
|
The value should not contain leading or trailing forward slashes.
|
227
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
228
227
|
*Available only for Vault Enterprise*.
|
@@ -248,57 +247,57 @@ class _BackendConfigAcmeState:
|
|
248
247
|
if namespace is not None:
|
249
248
|
pulumi.set(__self__, "namespace", namespace)
|
250
249
|
|
251
|
-
@property
|
250
|
+
@_builtins.property
|
252
251
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
253
|
-
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[
|
252
|
+
def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
254
253
|
"""
|
255
254
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
256
255
|
"""
|
257
256
|
return pulumi.get(self, "allow_role_ext_key_usage")
|
258
257
|
|
259
258
|
@allow_role_ext_key_usage.setter
|
260
|
-
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[
|
259
|
+
def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
261
260
|
pulumi.set(self, "allow_role_ext_key_usage", value)
|
262
261
|
|
263
|
-
@property
|
262
|
+
@_builtins.property
|
264
263
|
@pulumi.getter(name="allowedIssuers")
|
265
|
-
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
264
|
+
def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
266
265
|
"""
|
267
266
|
Specifies which issuers are allowed for use with ACME.
|
268
267
|
"""
|
269
268
|
return pulumi.get(self, "allowed_issuers")
|
270
269
|
|
271
270
|
@allowed_issuers.setter
|
272
|
-
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
271
|
+
def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
273
272
|
pulumi.set(self, "allowed_issuers", value)
|
274
273
|
|
275
|
-
@property
|
274
|
+
@_builtins.property
|
276
275
|
@pulumi.getter(name="allowedRoles")
|
277
|
-
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
276
|
+
def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
278
277
|
"""
|
279
278
|
Specifies which roles are allowed for use with ACME.
|
280
279
|
"""
|
281
280
|
return pulumi.get(self, "allowed_roles")
|
282
281
|
|
283
282
|
@allowed_roles.setter
|
284
|
-
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
283
|
+
def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
285
284
|
pulumi.set(self, "allowed_roles", value)
|
286
285
|
|
287
|
-
@property
|
286
|
+
@_builtins.property
|
288
287
|
@pulumi.getter
|
289
|
-
def backend(self) -> Optional[pulumi.Input[
|
288
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
290
289
|
"""
|
291
290
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
292
291
|
"""
|
293
292
|
return pulumi.get(self, "backend")
|
294
293
|
|
295
294
|
@backend.setter
|
296
|
-
def backend(self, value: Optional[pulumi.Input[
|
295
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
297
296
|
pulumi.set(self, "backend", value)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
301
|
-
def default_directory_policy(self) -> Optional[pulumi.Input[
|
300
|
+
def default_directory_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
302
301
|
"""
|
303
302
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
304
303
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
@@ -306,12 +305,12 @@ class _BackendConfigAcmeState:
|
|
306
305
|
return pulumi.get(self, "default_directory_policy")
|
307
306
|
|
308
307
|
@default_directory_policy.setter
|
309
|
-
def default_directory_policy(self, value: Optional[pulumi.Input[
|
308
|
+
def default_directory_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
310
309
|
pulumi.set(self, "default_directory_policy", value)
|
311
310
|
|
312
|
-
@property
|
311
|
+
@_builtins.property
|
313
312
|
@pulumi.getter(name="dnsResolver")
|
314
|
-
def dns_resolver(self) -> Optional[pulumi.Input[
|
313
|
+
def dns_resolver(self) -> Optional[pulumi.Input[_builtins.str]]:
|
315
314
|
"""
|
316
315
|
DNS resolver to use for domain resolution on this mount.
|
317
316
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
@@ -319,12 +318,12 @@ class _BackendConfigAcmeState:
|
|
319
318
|
return pulumi.get(self, "dns_resolver")
|
320
319
|
|
321
320
|
@dns_resolver.setter
|
322
|
-
def dns_resolver(self, value: Optional[pulumi.Input[
|
321
|
+
def dns_resolver(self, value: Optional[pulumi.Input[_builtins.str]]):
|
323
322
|
pulumi.set(self, "dns_resolver", value)
|
324
323
|
|
325
|
-
@property
|
324
|
+
@_builtins.property
|
326
325
|
@pulumi.getter(name="eabPolicy")
|
327
|
-
def eab_policy(self) -> Optional[pulumi.Input[
|
326
|
+
def eab_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
328
327
|
"""
|
329
328
|
Specifies the policy to use for external account binding behaviour.
|
330
329
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
@@ -332,36 +331,36 @@ class _BackendConfigAcmeState:
|
|
332
331
|
return pulumi.get(self, "eab_policy")
|
333
332
|
|
334
333
|
@eab_policy.setter
|
335
|
-
def eab_policy(self, value: Optional[pulumi.Input[
|
334
|
+
def eab_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
335
|
pulumi.set(self, "eab_policy", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter
|
340
|
-
def enabled(self) -> Optional[pulumi.Input[
|
339
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
341
340
|
"""
|
342
341
|
Specifies whether ACME is enabled.
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "enabled")
|
345
344
|
|
346
345
|
@enabled.setter
|
347
|
-
def enabled(self, value: Optional[pulumi.Input[
|
346
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
348
347
|
pulumi.set(self, "enabled", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter(name="maxTtl")
|
352
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
351
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
353
352
|
"""
|
354
353
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "max_ttl")
|
357
356
|
|
358
357
|
@max_ttl.setter
|
359
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
358
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
360
359
|
pulumi.set(self, "max_ttl", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter
|
364
|
-
def namespace(self) -> Optional[pulumi.Input[
|
363
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
The namespace to provision the resource in.
|
367
366
|
The value should not contain leading or trailing forward slashes.
|
@@ -371,7 +370,7 @@ class _BackendConfigAcmeState:
|
|
371
370
|
return pulumi.get(self, "namespace")
|
372
371
|
|
373
372
|
@namespace.setter
|
374
|
-
def namespace(self, value: Optional[pulumi.Input[
|
373
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
375
374
|
pulumi.set(self, "namespace", value)
|
376
375
|
|
377
376
|
|
@@ -381,16 +380,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
381
380
|
def __init__(__self__,
|
382
381
|
resource_name: str,
|
383
382
|
opts: Optional[pulumi.ResourceOptions] = None,
|
384
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[
|
385
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
386
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
387
|
-
backend: Optional[pulumi.Input[
|
388
|
-
default_directory_policy: Optional[pulumi.Input[
|
389
|
-
dns_resolver: Optional[pulumi.Input[
|
390
|
-
eab_policy: Optional[pulumi.Input[
|
391
|
-
enabled: Optional[pulumi.Input[
|
392
|
-
max_ttl: Optional[pulumi.Input[
|
393
|
-
namespace: Optional[pulumi.Input[
|
383
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
|
384
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
385
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
386
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
387
|
+
default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
388
|
+
dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
|
389
|
+
eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
390
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
391
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
392
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
394
393
|
__props__=None):
|
395
394
|
"""
|
396
395
|
Allows setting the ACME server configuration used by specified mount.
|
@@ -406,11 +405,11 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
406
405
|
type="pki",
|
407
406
|
default_lease_ttl_seconds=3600,
|
408
407
|
max_lease_ttl_seconds=86400)
|
409
|
-
pki_config_cluster = vault.
|
408
|
+
pki_config_cluster = vault.pkisecret.BackendConfigCluster("pki_config_cluster",
|
410
409
|
backend=pki.path,
|
411
410
|
path="http://127.0.0.1:8200/v1/pki",
|
412
411
|
aia_path="http://127.0.0.1:8200/v1/pki")
|
413
|
-
example = vault.
|
412
|
+
example = vault.pkisecret.BackendConfigAcme("example",
|
414
413
|
backend=pki.path,
|
415
414
|
enabled=True,
|
416
415
|
allowed_issuers=["*"],
|
@@ -433,19 +432,19 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
433
432
|
|
434
433
|
:param str resource_name: The name of the resource.
|
435
434
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
436
|
-
:param pulumi.Input[
|
437
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
438
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
439
|
-
:param pulumi.Input[
|
440
|
-
:param pulumi.Input[
|
435
|
+
:param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
436
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
437
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
438
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
439
|
+
:param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
441
440
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
442
|
-
:param pulumi.Input[
|
441
|
+
:param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
443
442
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
444
|
-
:param pulumi.Input[
|
443
|
+
:param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
445
444
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
446
|
-
:param pulumi.Input[
|
447
|
-
:param pulumi.Input[
|
448
|
-
:param pulumi.Input[
|
445
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
|
446
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
447
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
449
448
|
The value should not contain leading or trailing forward slashes.
|
450
449
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
451
450
|
*Available only for Vault Enterprise*.
|
@@ -470,11 +469,11 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
470
469
|
type="pki",
|
471
470
|
default_lease_ttl_seconds=3600,
|
472
471
|
max_lease_ttl_seconds=86400)
|
473
|
-
pki_config_cluster = vault.
|
472
|
+
pki_config_cluster = vault.pkisecret.BackendConfigCluster("pki_config_cluster",
|
474
473
|
backend=pki.path,
|
475
474
|
path="http://127.0.0.1:8200/v1/pki",
|
476
475
|
aia_path="http://127.0.0.1:8200/v1/pki")
|
477
|
-
example = vault.
|
476
|
+
example = vault.pkisecret.BackendConfigAcme("example",
|
478
477
|
backend=pki.path,
|
479
478
|
enabled=True,
|
480
479
|
allowed_issuers=["*"],
|
@@ -510,16 +509,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
510
509
|
def _internal_init(__self__,
|
511
510
|
resource_name: str,
|
512
511
|
opts: Optional[pulumi.ResourceOptions] = None,
|
513
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[
|
514
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
515
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
backend: Optional[pulumi.Input[
|
517
|
-
default_directory_policy: Optional[pulumi.Input[
|
518
|
-
dns_resolver: Optional[pulumi.Input[
|
519
|
-
eab_policy: Optional[pulumi.Input[
|
520
|
-
enabled: Optional[pulumi.Input[
|
521
|
-
max_ttl: Optional[pulumi.Input[
|
522
|
-
namespace: Optional[pulumi.Input[
|
512
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
|
513
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
514
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
515
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
516
|
+
default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
517
|
+
dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
|
518
|
+
eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
519
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
520
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
521
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
523
522
|
__props__=None):
|
524
523
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
525
524
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -553,16 +552,16 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
553
552
|
def get(resource_name: str,
|
554
553
|
id: pulumi.Input[str],
|
555
554
|
opts: Optional[pulumi.ResourceOptions] = None,
|
556
|
-
allow_role_ext_key_usage: Optional[pulumi.Input[
|
557
|
-
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
558
|
-
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
559
|
-
backend: Optional[pulumi.Input[
|
560
|
-
default_directory_policy: Optional[pulumi.Input[
|
561
|
-
dns_resolver: Optional[pulumi.Input[
|
562
|
-
eab_policy: Optional[pulumi.Input[
|
563
|
-
enabled: Optional[pulumi.Input[
|
564
|
-
max_ttl: Optional[pulumi.Input[
|
565
|
-
namespace: Optional[pulumi.Input[
|
555
|
+
allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
|
556
|
+
allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
557
|
+
allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
558
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
559
|
+
default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
560
|
+
dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
|
561
|
+
eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
562
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
563
|
+
max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
564
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigAcme':
|
566
565
|
"""
|
567
566
|
Get an existing BackendConfigAcme resource's state with the given name, id, and optional extra
|
568
567
|
properties used to qualify the lookup.
|
@@ -570,19 +569,19 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
570
569
|
:param str resource_name: The unique name of the resulting resource.
|
571
570
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
572
571
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
573
|
-
:param pulumi.Input[
|
574
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
575
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
576
|
-
:param pulumi.Input[
|
577
|
-
:param pulumi.Input[
|
572
|
+
:param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
573
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
|
574
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
|
575
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
576
|
+
:param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
|
578
577
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
579
|
-
:param pulumi.Input[
|
578
|
+
:param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
|
580
579
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
581
|
-
:param pulumi.Input[
|
580
|
+
:param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
|
582
581
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
583
|
-
:param pulumi.Input[
|
584
|
-
:param pulumi.Input[
|
585
|
-
:param pulumi.Input[
|
582
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
|
583
|
+
:param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
584
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
586
585
|
The value should not contain leading or trailing forward slashes.
|
587
586
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
588
587
|
*Available only for Vault Enterprise*.
|
@@ -603,84 +602,84 @@ class BackendConfigAcme(pulumi.CustomResource):
|
|
603
602
|
__props__.__dict__["namespace"] = namespace
|
604
603
|
return BackendConfigAcme(resource_name, opts=opts, __props__=__props__)
|
605
604
|
|
606
|
-
@property
|
605
|
+
@_builtins.property
|
607
606
|
@pulumi.getter(name="allowRoleExtKeyUsage")
|
608
|
-
def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[
|
607
|
+
def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
609
608
|
"""
|
610
609
|
Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
|
611
610
|
"""
|
612
611
|
return pulumi.get(self, "allow_role_ext_key_usage")
|
613
612
|
|
614
|
-
@property
|
613
|
+
@_builtins.property
|
615
614
|
@pulumi.getter(name="allowedIssuers")
|
616
|
-
def allowed_issuers(self) -> pulumi.Output[Sequence[
|
615
|
+
def allowed_issuers(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
617
616
|
"""
|
618
617
|
Specifies which issuers are allowed for use with ACME.
|
619
618
|
"""
|
620
619
|
return pulumi.get(self, "allowed_issuers")
|
621
620
|
|
622
|
-
@property
|
621
|
+
@_builtins.property
|
623
622
|
@pulumi.getter(name="allowedRoles")
|
624
|
-
def allowed_roles(self) -> pulumi.Output[Sequence[
|
623
|
+
def allowed_roles(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
625
624
|
"""
|
626
625
|
Specifies which roles are allowed for use with ACME.
|
627
626
|
"""
|
628
627
|
return pulumi.get(self, "allowed_roles")
|
629
628
|
|
630
|
-
@property
|
629
|
+
@_builtins.property
|
631
630
|
@pulumi.getter
|
632
|
-
def backend(self) -> pulumi.Output[
|
631
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
633
632
|
"""
|
634
633
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
635
634
|
"""
|
636
635
|
return pulumi.get(self, "backend")
|
637
636
|
|
638
|
-
@property
|
637
|
+
@_builtins.property
|
639
638
|
@pulumi.getter(name="defaultDirectoryPolicy")
|
640
|
-
def default_directory_policy(self) -> pulumi.Output[
|
639
|
+
def default_directory_policy(self) -> pulumi.Output[_builtins.str]:
|
641
640
|
"""
|
642
641
|
Specifies the policy to be used for non-role-qualified ACME requests.
|
643
642
|
Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
|
644
643
|
"""
|
645
644
|
return pulumi.get(self, "default_directory_policy")
|
646
645
|
|
647
|
-
@property
|
646
|
+
@_builtins.property
|
648
647
|
@pulumi.getter(name="dnsResolver")
|
649
|
-
def dns_resolver(self) -> pulumi.Output[Optional[
|
648
|
+
def dns_resolver(self) -> pulumi.Output[Optional[_builtins.str]]:
|
650
649
|
"""
|
651
650
|
DNS resolver to use for domain resolution on this mount.
|
652
651
|
Must be in the format `<host>:<port>`, with both parts mandatory.
|
653
652
|
"""
|
654
653
|
return pulumi.get(self, "dns_resolver")
|
655
654
|
|
656
|
-
@property
|
655
|
+
@_builtins.property
|
657
656
|
@pulumi.getter(name="eabPolicy")
|
658
|
-
def eab_policy(self) -> pulumi.Output[
|
657
|
+
def eab_policy(self) -> pulumi.Output[_builtins.str]:
|
659
658
|
"""
|
660
659
|
Specifies the policy to use for external account binding behaviour.
|
661
660
|
Allowed values are `not-required`, `new-account-required` or `always-required`.
|
662
661
|
"""
|
663
662
|
return pulumi.get(self, "eab_policy")
|
664
663
|
|
665
|
-
@property
|
664
|
+
@_builtins.property
|
666
665
|
@pulumi.getter
|
667
|
-
def enabled(self) -> pulumi.Output[
|
666
|
+
def enabled(self) -> pulumi.Output[_builtins.bool]:
|
668
667
|
"""
|
669
668
|
Specifies whether ACME is enabled.
|
670
669
|
"""
|
671
670
|
return pulumi.get(self, "enabled")
|
672
671
|
|
673
|
-
@property
|
672
|
+
@_builtins.property
|
674
673
|
@pulumi.getter(name="maxTtl")
|
675
|
-
def max_ttl(self) -> pulumi.Output[
|
674
|
+
def max_ttl(self) -> pulumi.Output[_builtins.int]:
|
676
675
|
"""
|
677
676
|
The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
|
678
677
|
"""
|
679
678
|
return pulumi.get(self, "max_ttl")
|
680
679
|
|
681
|
-
@property
|
680
|
+
@_builtins.property
|
682
681
|
@pulumi.getter
|
683
|
-
def namespace(self) -> pulumi.Output[Optional[
|
682
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
684
683
|
"""
|
685
684
|
The namespace to provision the resource in.
|
686
685
|
The value should not contain leading or trailing forward slashes.
|