pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,31 +19,31 @@ __all__ = ['BackendConfigAcmeArgs', 'BackendConfigAcme']
20
19
  @pulumi.input_type
21
20
  class BackendConfigAcmeArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- enabled: pulumi.Input[builtins.bool],
25
- allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
26
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
29
- dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
30
- eab_policy: Optional[pulumi.Input[builtins.str]] = None,
31
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ enabled: pulumi.Input[_builtins.bool],
24
+ allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
28
+ dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
29
+ eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
30
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
33
32
  """
34
33
  The set of arguments for constructing a BackendConfigAcme resource.
35
- :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
36
- :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
37
- :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
39
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
40
- :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
34
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
35
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
36
+ :param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
39
+ :param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
41
40
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
42
- :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
41
+ :param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
43
42
  Must be in the format `<host>:<port>`, with both parts mandatory.
44
- :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
43
+ :param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
45
44
  Allowed values are `not-required`, `new-account-required` or `always-required`.
46
- :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
47
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
45
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
47
  The value should not contain leading or trailing forward slashes.
49
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
50
49
  *Available only for Vault Enterprise*.
@@ -68,69 +67,69 @@ class BackendConfigAcmeArgs:
68
67
  if namespace is not None:
69
68
  pulumi.set(__self__, "namespace", namespace)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def backend(self) -> pulumi.Input[builtins.str]:
72
+ def backend(self) -> pulumi.Input[_builtins.str]:
74
73
  """
75
74
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
76
75
  """
77
76
  return pulumi.get(self, "backend")
78
77
 
79
78
  @backend.setter
80
- def backend(self, value: pulumi.Input[builtins.str]):
79
+ def backend(self, value: pulumi.Input[_builtins.str]):
81
80
  pulumi.set(self, "backend", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def enabled(self) -> pulumi.Input[builtins.bool]:
84
+ def enabled(self) -> pulumi.Input[_builtins.bool]:
86
85
  """
87
86
  Specifies whether ACME is enabled.
88
87
  """
89
88
  return pulumi.get(self, "enabled")
90
89
 
91
90
  @enabled.setter
92
- def enabled(self, value: pulumi.Input[builtins.bool]):
91
+ def enabled(self, value: pulumi.Input[_builtins.bool]):
93
92
  pulumi.set(self, "enabled", value)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter(name="allowRoleExtKeyUsage")
97
- def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
96
+ def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[_builtins.bool]]:
98
97
  """
99
98
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
100
99
  """
101
100
  return pulumi.get(self, "allow_role_ext_key_usage")
102
101
 
103
102
  @allow_role_ext_key_usage.setter
104
- def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
103
+ def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[_builtins.bool]]):
105
104
  pulumi.set(self, "allow_role_ext_key_usage", value)
106
105
 
107
- @property
106
+ @_builtins.property
108
107
  @pulumi.getter(name="allowedIssuers")
109
- def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
108
+ def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
110
109
  """
111
110
  Specifies which issuers are allowed for use with ACME.
112
111
  """
113
112
  return pulumi.get(self, "allowed_issuers")
114
113
 
115
114
  @allowed_issuers.setter
116
- def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
115
+ def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
117
116
  pulumi.set(self, "allowed_issuers", value)
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter(name="allowedRoles")
121
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
120
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
122
121
  """
123
122
  Specifies which roles are allowed for use with ACME.
124
123
  """
125
124
  return pulumi.get(self, "allowed_roles")
126
125
 
127
126
  @allowed_roles.setter
128
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
127
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
129
128
  pulumi.set(self, "allowed_roles", value)
130
129
 
131
- @property
130
+ @_builtins.property
132
131
  @pulumi.getter(name="defaultDirectoryPolicy")
133
- def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
132
+ def default_directory_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
134
133
  """
135
134
  Specifies the policy to be used for non-role-qualified ACME requests.
136
135
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
@@ -138,12 +137,12 @@ class BackendConfigAcmeArgs:
138
137
  return pulumi.get(self, "default_directory_policy")
139
138
 
140
139
  @default_directory_policy.setter
141
- def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
140
+ def default_directory_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
142
141
  pulumi.set(self, "default_directory_policy", value)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter(name="dnsResolver")
146
- def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
145
+ def dns_resolver(self) -> Optional[pulumi.Input[_builtins.str]]:
147
146
  """
148
147
  DNS resolver to use for domain resolution on this mount.
149
148
  Must be in the format `<host>:<port>`, with both parts mandatory.
@@ -151,12 +150,12 @@ class BackendConfigAcmeArgs:
151
150
  return pulumi.get(self, "dns_resolver")
152
151
 
153
152
  @dns_resolver.setter
154
- def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
153
+ def dns_resolver(self, value: Optional[pulumi.Input[_builtins.str]]):
155
154
  pulumi.set(self, "dns_resolver", value)
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter(name="eabPolicy")
159
- def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
158
+ def eab_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
160
159
  """
161
160
  Specifies the policy to use for external account binding behaviour.
162
161
  Allowed values are `not-required`, `new-account-required` or `always-required`.
@@ -164,24 +163,24 @@ class BackendConfigAcmeArgs:
164
163
  return pulumi.get(self, "eab_policy")
165
164
 
166
165
  @eab_policy.setter
167
- def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
166
+ def eab_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
168
167
  pulumi.set(self, "eab_policy", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter(name="maxTtl")
172
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
171
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
173
172
  """
174
173
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
175
174
  """
176
175
  return pulumi.get(self, "max_ttl")
177
176
 
178
177
  @max_ttl.setter
179
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
178
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
180
179
  pulumi.set(self, "max_ttl", value)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter
184
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
183
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
185
184
  """
186
185
  The namespace to provision the resource in.
187
186
  The value should not contain leading or trailing forward slashes.
@@ -191,38 +190,38 @@ class BackendConfigAcmeArgs:
191
190
  return pulumi.get(self, "namespace")
192
191
 
193
192
  @namespace.setter
194
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
193
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
195
194
  pulumi.set(self, "namespace", value)
196
195
 
197
196
 
198
197
  @pulumi.input_type
199
198
  class _BackendConfigAcmeState:
200
199
  def __init__(__self__, *,
201
- allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
202
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
203
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
204
- backend: Optional[pulumi.Input[builtins.str]] = None,
205
- default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
206
- dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
207
- eab_policy: Optional[pulumi.Input[builtins.str]] = None,
208
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
209
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
210
- namespace: Optional[pulumi.Input[builtins.str]] = None):
200
+ allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
201
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
202
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
203
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
204
+ default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
205
+ dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
206
+ eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
207
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
208
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
209
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
211
210
  """
212
211
  Input properties used for looking up and filtering BackendConfigAcme resources.
213
- :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
214
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
215
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
216
- :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
217
- :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
212
+ :param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
213
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
214
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
215
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
216
+ :param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
218
217
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
219
- :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
218
+ :param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
220
219
  Must be in the format `<host>:<port>`, with both parts mandatory.
221
- :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
220
+ :param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
222
221
  Allowed values are `not-required`, `new-account-required` or `always-required`.
223
- :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
224
- :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
225
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
222
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
223
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
224
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
226
225
  The value should not contain leading or trailing forward slashes.
227
226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
228
227
  *Available only for Vault Enterprise*.
@@ -248,57 +247,57 @@ class _BackendConfigAcmeState:
248
247
  if namespace is not None:
249
248
  pulumi.set(__self__, "namespace", namespace)
250
249
 
251
- @property
250
+ @_builtins.property
252
251
  @pulumi.getter(name="allowRoleExtKeyUsage")
253
- def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
252
+ def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[_builtins.bool]]:
254
253
  """
255
254
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
256
255
  """
257
256
  return pulumi.get(self, "allow_role_ext_key_usage")
258
257
 
259
258
  @allow_role_ext_key_usage.setter
260
- def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
259
+ def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[_builtins.bool]]):
261
260
  pulumi.set(self, "allow_role_ext_key_usage", value)
262
261
 
263
- @property
262
+ @_builtins.property
264
263
  @pulumi.getter(name="allowedIssuers")
265
- def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
264
+ def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
266
265
  """
267
266
  Specifies which issuers are allowed for use with ACME.
268
267
  """
269
268
  return pulumi.get(self, "allowed_issuers")
270
269
 
271
270
  @allowed_issuers.setter
272
- def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
271
+ def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
273
272
  pulumi.set(self, "allowed_issuers", value)
274
273
 
275
- @property
274
+ @_builtins.property
276
275
  @pulumi.getter(name="allowedRoles")
277
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
276
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
278
277
  """
279
278
  Specifies which roles are allowed for use with ACME.
280
279
  """
281
280
  return pulumi.get(self, "allowed_roles")
282
281
 
283
282
  @allowed_roles.setter
284
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
283
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
285
284
  pulumi.set(self, "allowed_roles", value)
286
285
 
287
- @property
286
+ @_builtins.property
288
287
  @pulumi.getter
289
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
288
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
290
289
  """
291
290
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
292
291
  """
293
292
  return pulumi.get(self, "backend")
294
293
 
295
294
  @backend.setter
296
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
295
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
297
296
  pulumi.set(self, "backend", value)
298
297
 
299
- @property
298
+ @_builtins.property
300
299
  @pulumi.getter(name="defaultDirectoryPolicy")
301
- def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
300
+ def default_directory_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
302
301
  """
303
302
  Specifies the policy to be used for non-role-qualified ACME requests.
304
303
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
@@ -306,12 +305,12 @@ class _BackendConfigAcmeState:
306
305
  return pulumi.get(self, "default_directory_policy")
307
306
 
308
307
  @default_directory_policy.setter
309
- def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
308
+ def default_directory_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
310
309
  pulumi.set(self, "default_directory_policy", value)
311
310
 
312
- @property
311
+ @_builtins.property
313
312
  @pulumi.getter(name="dnsResolver")
314
- def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
313
+ def dns_resolver(self) -> Optional[pulumi.Input[_builtins.str]]:
315
314
  """
316
315
  DNS resolver to use for domain resolution on this mount.
317
316
  Must be in the format `<host>:<port>`, with both parts mandatory.
@@ -319,12 +318,12 @@ class _BackendConfigAcmeState:
319
318
  return pulumi.get(self, "dns_resolver")
320
319
 
321
320
  @dns_resolver.setter
322
- def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
321
+ def dns_resolver(self, value: Optional[pulumi.Input[_builtins.str]]):
323
322
  pulumi.set(self, "dns_resolver", value)
324
323
 
325
- @property
324
+ @_builtins.property
326
325
  @pulumi.getter(name="eabPolicy")
327
- def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
326
+ def eab_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
328
327
  """
329
328
  Specifies the policy to use for external account binding behaviour.
330
329
  Allowed values are `not-required`, `new-account-required` or `always-required`.
@@ -332,36 +331,36 @@ class _BackendConfigAcmeState:
332
331
  return pulumi.get(self, "eab_policy")
333
332
 
334
333
  @eab_policy.setter
335
- def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
334
+ def eab_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
336
335
  pulumi.set(self, "eab_policy", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter
340
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
339
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
341
340
  """
342
341
  Specifies whether ACME is enabled.
343
342
  """
344
343
  return pulumi.get(self, "enabled")
345
344
 
346
345
  @enabled.setter
347
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
346
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
348
347
  pulumi.set(self, "enabled", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter(name="maxTtl")
352
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
351
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
353
352
  """
354
353
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
355
354
  """
356
355
  return pulumi.get(self, "max_ttl")
357
356
 
358
357
  @max_ttl.setter
359
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
358
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
360
359
  pulumi.set(self, "max_ttl", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter
364
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
363
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
365
364
  """
366
365
  The namespace to provision the resource in.
367
366
  The value should not contain leading or trailing forward slashes.
@@ -371,7 +370,7 @@ class _BackendConfigAcmeState:
371
370
  return pulumi.get(self, "namespace")
372
371
 
373
372
  @namespace.setter
374
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
373
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
375
374
  pulumi.set(self, "namespace", value)
376
375
 
377
376
 
@@ -381,16 +380,16 @@ class BackendConfigAcme(pulumi.CustomResource):
381
380
  def __init__(__self__,
382
381
  resource_name: str,
383
382
  opts: Optional[pulumi.ResourceOptions] = None,
384
- allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
385
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
386
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
387
- backend: Optional[pulumi.Input[builtins.str]] = None,
388
- default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
389
- dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
390
- eab_policy: Optional[pulumi.Input[builtins.str]] = None,
391
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
392
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
393
- namespace: Optional[pulumi.Input[builtins.str]] = None,
383
+ allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
384
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
386
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
387
+ default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
388
+ dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
389
+ eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
390
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
391
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
392
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
394
393
  __props__=None):
395
394
  """
396
395
  Allows setting the ACME server configuration used by specified mount.
@@ -406,11 +405,11 @@ class BackendConfigAcme(pulumi.CustomResource):
406
405
  type="pki",
407
406
  default_lease_ttl_seconds=3600,
408
407
  max_lease_ttl_seconds=86400)
409
- pki_config_cluster = vault.pki_secret.BackendConfigCluster("pki_config_cluster",
408
+ pki_config_cluster = vault.pkisecret.BackendConfigCluster("pki_config_cluster",
410
409
  backend=pki.path,
411
410
  path="http://127.0.0.1:8200/v1/pki",
412
411
  aia_path="http://127.0.0.1:8200/v1/pki")
413
- example = vault.pki_secret.BackendConfigAcme("example",
412
+ example = vault.pkisecret.BackendConfigAcme("example",
414
413
  backend=pki.path,
415
414
  enabled=True,
416
415
  allowed_issuers=["*"],
@@ -433,19 +432,19 @@ class BackendConfigAcme(pulumi.CustomResource):
433
432
 
434
433
  :param str resource_name: The name of the resource.
435
434
  :param pulumi.ResourceOptions opts: Options for the resource.
436
- :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
437
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
438
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
439
- :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
440
- :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
435
+ :param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
436
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
437
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
438
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
439
+ :param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
441
440
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
442
- :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
441
+ :param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
443
442
  Must be in the format `<host>:<port>`, with both parts mandatory.
444
- :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
443
+ :param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
445
444
  Allowed values are `not-required`, `new-account-required` or `always-required`.
446
- :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
447
- :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
448
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
445
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
446
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
447
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
449
448
  The value should not contain leading or trailing forward slashes.
450
449
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
451
450
  *Available only for Vault Enterprise*.
@@ -470,11 +469,11 @@ class BackendConfigAcme(pulumi.CustomResource):
470
469
  type="pki",
471
470
  default_lease_ttl_seconds=3600,
472
471
  max_lease_ttl_seconds=86400)
473
- pki_config_cluster = vault.pki_secret.BackendConfigCluster("pki_config_cluster",
472
+ pki_config_cluster = vault.pkisecret.BackendConfigCluster("pki_config_cluster",
474
473
  backend=pki.path,
475
474
  path="http://127.0.0.1:8200/v1/pki",
476
475
  aia_path="http://127.0.0.1:8200/v1/pki")
477
- example = vault.pki_secret.BackendConfigAcme("example",
476
+ example = vault.pkisecret.BackendConfigAcme("example",
478
477
  backend=pki.path,
479
478
  enabled=True,
480
479
  allowed_issuers=["*"],
@@ -510,16 +509,16 @@ class BackendConfigAcme(pulumi.CustomResource):
510
509
  def _internal_init(__self__,
511
510
  resource_name: str,
512
511
  opts: Optional[pulumi.ResourceOptions] = None,
513
- allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
514
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
515
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
516
- backend: Optional[pulumi.Input[builtins.str]] = None,
517
- default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
518
- dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
519
- eab_policy: Optional[pulumi.Input[builtins.str]] = None,
520
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
521
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
522
- namespace: Optional[pulumi.Input[builtins.str]] = None,
512
+ allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
513
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
514
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
515
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
516
+ default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
517
+ dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
518
+ eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
519
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
520
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
521
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
523
522
  __props__=None):
524
523
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
525
524
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -553,16 +552,16 @@ class BackendConfigAcme(pulumi.CustomResource):
553
552
  def get(resource_name: str,
554
553
  id: pulumi.Input[str],
555
554
  opts: Optional[pulumi.ResourceOptions] = None,
556
- allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
557
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
558
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
559
- backend: Optional[pulumi.Input[builtins.str]] = None,
560
- default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
561
- dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
562
- eab_policy: Optional[pulumi.Input[builtins.str]] = None,
563
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
564
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
565
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigAcme':
555
+ allow_role_ext_key_usage: Optional[pulumi.Input[_builtins.bool]] = None,
556
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
557
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
558
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
559
+ default_directory_policy: Optional[pulumi.Input[_builtins.str]] = None,
560
+ dns_resolver: Optional[pulumi.Input[_builtins.str]] = None,
561
+ eab_policy: Optional[pulumi.Input[_builtins.str]] = None,
562
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
563
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
564
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigAcme':
566
565
  """
567
566
  Get an existing BackendConfigAcme resource's state with the given name, id, and optional extra
568
567
  properties used to qualify the lookup.
@@ -570,19 +569,19 @@ class BackendConfigAcme(pulumi.CustomResource):
570
569
  :param str resource_name: The unique name of the resulting resource.
571
570
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
572
571
  :param pulumi.ResourceOptions opts: Options for the resource.
573
- :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
574
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
575
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
576
- :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
577
- :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
572
+ :param pulumi.Input[_builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
573
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
574
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
575
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
576
+ :param pulumi.Input[_builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
578
577
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
579
- :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
578
+ :param pulumi.Input[_builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
580
579
  Must be in the format `<host>:<port>`, with both parts mandatory.
581
- :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
580
+ :param pulumi.Input[_builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
582
581
  Allowed values are `not-required`, `new-account-required` or `always-required`.
583
- :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
584
- :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
585
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
582
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether ACME is enabled.
583
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
584
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
586
585
  The value should not contain leading or trailing forward slashes.
587
586
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
588
587
  *Available only for Vault Enterprise*.
@@ -603,84 +602,84 @@ class BackendConfigAcme(pulumi.CustomResource):
603
602
  __props__.__dict__["namespace"] = namespace
604
603
  return BackendConfigAcme(resource_name, opts=opts, __props__=__props__)
605
604
 
606
- @property
605
+ @_builtins.property
607
606
  @pulumi.getter(name="allowRoleExtKeyUsage")
608
- def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[builtins.bool]]:
607
+ def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[_builtins.bool]]:
609
608
  """
610
609
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
611
610
  """
612
611
  return pulumi.get(self, "allow_role_ext_key_usage")
613
612
 
614
- @property
613
+ @_builtins.property
615
614
  @pulumi.getter(name="allowedIssuers")
616
- def allowed_issuers(self) -> pulumi.Output[Sequence[builtins.str]]:
615
+ def allowed_issuers(self) -> pulumi.Output[Sequence[_builtins.str]]:
617
616
  """
618
617
  Specifies which issuers are allowed for use with ACME.
619
618
  """
620
619
  return pulumi.get(self, "allowed_issuers")
621
620
 
622
- @property
621
+ @_builtins.property
623
622
  @pulumi.getter(name="allowedRoles")
624
- def allowed_roles(self) -> pulumi.Output[Sequence[builtins.str]]:
623
+ def allowed_roles(self) -> pulumi.Output[Sequence[_builtins.str]]:
625
624
  """
626
625
  Specifies which roles are allowed for use with ACME.
627
626
  """
628
627
  return pulumi.get(self, "allowed_roles")
629
628
 
630
- @property
629
+ @_builtins.property
631
630
  @pulumi.getter
632
- def backend(self) -> pulumi.Output[builtins.str]:
631
+ def backend(self) -> pulumi.Output[_builtins.str]:
633
632
  """
634
633
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
635
634
  """
636
635
  return pulumi.get(self, "backend")
637
636
 
638
- @property
637
+ @_builtins.property
639
638
  @pulumi.getter(name="defaultDirectoryPolicy")
640
- def default_directory_policy(self) -> pulumi.Output[builtins.str]:
639
+ def default_directory_policy(self) -> pulumi.Output[_builtins.str]:
641
640
  """
642
641
  Specifies the policy to be used for non-role-qualified ACME requests.
643
642
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
644
643
  """
645
644
  return pulumi.get(self, "default_directory_policy")
646
645
 
647
- @property
646
+ @_builtins.property
648
647
  @pulumi.getter(name="dnsResolver")
649
- def dns_resolver(self) -> pulumi.Output[Optional[builtins.str]]:
648
+ def dns_resolver(self) -> pulumi.Output[Optional[_builtins.str]]:
650
649
  """
651
650
  DNS resolver to use for domain resolution on this mount.
652
651
  Must be in the format `<host>:<port>`, with both parts mandatory.
653
652
  """
654
653
  return pulumi.get(self, "dns_resolver")
655
654
 
656
- @property
655
+ @_builtins.property
657
656
  @pulumi.getter(name="eabPolicy")
658
- def eab_policy(self) -> pulumi.Output[builtins.str]:
657
+ def eab_policy(self) -> pulumi.Output[_builtins.str]:
659
658
  """
660
659
  Specifies the policy to use for external account binding behaviour.
661
660
  Allowed values are `not-required`, `new-account-required` or `always-required`.
662
661
  """
663
662
  return pulumi.get(self, "eab_policy")
664
663
 
665
- @property
664
+ @_builtins.property
666
665
  @pulumi.getter
667
- def enabled(self) -> pulumi.Output[builtins.bool]:
666
+ def enabled(self) -> pulumi.Output[_builtins.bool]:
668
667
  """
669
668
  Specifies whether ACME is enabled.
670
669
  """
671
670
  return pulumi.get(self, "enabled")
672
671
 
673
- @property
672
+ @_builtins.property
674
673
  @pulumi.getter(name="maxTtl")
675
- def max_ttl(self) -> pulumi.Output[builtins.int]:
674
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
676
675
  """
677
676
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
678
677
  """
679
678
  return pulumi.get(self, "max_ttl")
680
679
 
681
- @property
680
+ @_builtins.property
682
681
  @pulumi.getter
683
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
682
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
684
683
  """
685
684
  The namespace to provision the resource in.
686
685
  The value should not contain leading or trailing forward slashes.