pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,16 +19,16 @@ __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateS
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendIntermediateSetSignedArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
certificate: pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
certificate: pulumi.Input[_builtins.str],
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
26
25
|
"""
|
27
26
|
The set of arguments for constructing a SecretBackendIntermediateSetSigned resource.
|
28
|
-
:param pulumi.Input[
|
29
|
-
:param pulumi.Input[
|
27
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
28
|
+
:param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
|
30
29
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
31
30
|
issue and sign operations.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
@@ -39,21 +38,21 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
39
38
|
if namespace is not None:
|
40
39
|
pulumi.set(__self__, "namespace", namespace)
|
41
40
|
|
42
|
-
@property
|
41
|
+
@_builtins.property
|
43
42
|
@pulumi.getter
|
44
|
-
def backend(self) -> pulumi.Input[
|
43
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
45
44
|
"""
|
46
45
|
The PKI secret backend the resource belongs to.
|
47
46
|
"""
|
48
47
|
return pulumi.get(self, "backend")
|
49
48
|
|
50
49
|
@backend.setter
|
51
|
-
def backend(self, value: pulumi.Input[
|
50
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
52
51
|
pulumi.set(self, "backend", value)
|
53
52
|
|
54
|
-
@property
|
53
|
+
@_builtins.property
|
55
54
|
@pulumi.getter
|
56
|
-
def certificate(self) -> pulumi.Input[
|
55
|
+
def certificate(self) -> pulumi.Input[_builtins.str]:
|
57
56
|
"""
|
58
57
|
Specifies the PEM encoded certificate. May optionally append additional
|
59
58
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
@@ -62,12 +61,12 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
62
61
|
return pulumi.get(self, "certificate")
|
63
62
|
|
64
63
|
@certificate.setter
|
65
|
-
def certificate(self, value: pulumi.Input[
|
64
|
+
def certificate(self, value: pulumi.Input[_builtins.str]):
|
66
65
|
pulumi.set(self, "certificate", value)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
|
-
def namespace(self) -> Optional[pulumi.Input[
|
69
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
71
70
|
"""
|
72
71
|
The namespace to provision the resource in.
|
73
72
|
The value should not contain leading or trailing forward slashes.
|
@@ -77,28 +76,28 @@ class SecretBackendIntermediateSetSignedArgs:
|
|
77
76
|
return pulumi.get(self, "namespace")
|
78
77
|
|
79
78
|
@namespace.setter
|
80
|
-
def namespace(self, value: Optional[pulumi.Input[
|
79
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
81
80
|
pulumi.set(self, "namespace", value)
|
82
81
|
|
83
82
|
|
84
83
|
@pulumi.input_type
|
85
84
|
class _SecretBackendIntermediateSetSignedState:
|
86
85
|
def __init__(__self__, *,
|
87
|
-
backend: Optional[pulumi.Input[
|
88
|
-
certificate: Optional[pulumi.Input[
|
89
|
-
imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
90
|
-
imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
91
|
-
namespace: Optional[pulumi.Input[
|
86
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
87
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
88
|
+
imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
89
|
+
imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
90
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
92
91
|
"""
|
93
92
|
Input properties used for looking up and filtering SecretBackendIntermediateSetSigned resources.
|
94
|
-
:param pulumi.Input[
|
95
|
-
:param pulumi.Input[
|
93
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
94
|
+
:param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
|
96
95
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
97
96
|
issue and sign operations.
|
98
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_issuers: The imported issuers indicating which issuers were created as part of
|
99
98
|
this request.
|
100
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
101
|
-
:param pulumi.Input[
|
99
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
100
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
102
101
|
The value should not contain leading or trailing forward slashes.
|
103
102
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
104
103
|
*Available only for Vault Enterprise*.
|
@@ -114,21 +113,21 @@ class _SecretBackendIntermediateSetSignedState:
|
|
114
113
|
if namespace is not None:
|
115
114
|
pulumi.set(__self__, "namespace", namespace)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter
|
119
|
-
def backend(self) -> Optional[pulumi.Input[
|
118
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
120
119
|
"""
|
121
120
|
The PKI secret backend the resource belongs to.
|
122
121
|
"""
|
123
122
|
return pulumi.get(self, "backend")
|
124
123
|
|
125
124
|
@backend.setter
|
126
|
-
def backend(self, value: Optional[pulumi.Input[
|
125
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
127
126
|
pulumi.set(self, "backend", value)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter
|
131
|
-
def certificate(self) -> Optional[pulumi.Input[
|
130
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
Specifies the PEM encoded certificate. May optionally append additional
|
134
133
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
@@ -137,12 +136,12 @@ class _SecretBackendIntermediateSetSignedState:
|
|
137
136
|
return pulumi.get(self, "certificate")
|
138
137
|
|
139
138
|
@certificate.setter
|
140
|
-
def certificate(self, value: Optional[pulumi.Input[
|
139
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
141
140
|
pulumi.set(self, "certificate", value)
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter(name="importedIssuers")
|
145
|
-
def imported_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
144
|
+
def imported_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
146
145
|
"""
|
147
146
|
The imported issuers indicating which issuers were created as part of
|
148
147
|
this request.
|
@@ -150,24 +149,24 @@ class _SecretBackendIntermediateSetSignedState:
|
|
150
149
|
return pulumi.get(self, "imported_issuers")
|
151
150
|
|
152
151
|
@imported_issuers.setter
|
153
|
-
def imported_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
152
|
+
def imported_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
154
153
|
pulumi.set(self, "imported_issuers", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter(name="importedKeys")
|
158
|
-
def imported_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
157
|
+
def imported_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
159
158
|
"""
|
160
159
|
The imported keys indicating which keys were created as part of this request.
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "imported_keys")
|
163
162
|
|
164
163
|
@imported_keys.setter
|
165
|
-
def imported_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
164
|
+
def imported_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
166
165
|
pulumi.set(self, "imported_keys", value)
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter
|
170
|
-
def namespace(self) -> Optional[pulumi.Input[
|
169
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
171
170
|
"""
|
172
171
|
The namespace to provision the resource in.
|
173
172
|
The value should not contain leading or trailing forward slashes.
|
@@ -177,7 +176,7 @@ class _SecretBackendIntermediateSetSignedState:
|
|
177
176
|
return pulumi.get(self, "namespace")
|
178
177
|
|
179
178
|
@namespace.setter
|
180
|
-
def namespace(self, value: Optional[pulumi.Input[
|
179
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
181
180
|
pulumi.set(self, "namespace", value)
|
182
181
|
|
183
182
|
|
@@ -187,9 +186,9 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
187
186
|
def __init__(__self__,
|
188
187
|
resource_name: str,
|
189
188
|
opts: Optional[pulumi.ResourceOptions] = None,
|
190
|
-
backend: Optional[pulumi.Input[
|
191
|
-
certificate: Optional[pulumi.Input[
|
192
|
-
namespace: Optional[pulumi.Input[
|
189
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
190
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
191
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
193
192
|
__props__=None):
|
194
193
|
"""
|
195
194
|
## Example Usage
|
@@ -210,7 +209,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
210
209
|
description="intermediate",
|
211
210
|
default_lease_ttl_seconds=86400,
|
212
211
|
max_lease_ttl_seconds=86400)
|
213
|
-
example = vault.
|
212
|
+
example = vault.pkisecret.SecretBackendRootCert("example",
|
214
213
|
backend=root.path,
|
215
214
|
type="internal",
|
216
215
|
common_name="RootOrg Root CA",
|
@@ -225,11 +224,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
225
224
|
country="US",
|
226
225
|
locality="San Francisco",
|
227
226
|
province="CA")
|
228
|
-
example_secret_backend_intermediate_cert_request = vault.
|
227
|
+
example_secret_backend_intermediate_cert_request = vault.pkisecret.SecretBackendIntermediateCertRequest("example",
|
229
228
|
backend=intermediate.path,
|
230
229
|
type=example.type,
|
231
230
|
common_name="SubOrg Intermediate CA")
|
232
|
-
example_secret_backend_root_sign_intermediate = vault.
|
231
|
+
example_secret_backend_root_sign_intermediate = vault.pkisecret.SecretBackendRootSignIntermediate("example",
|
233
232
|
backend=root.path,
|
234
233
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
235
234
|
common_name="SubOrg Intermediate CA",
|
@@ -240,18 +239,18 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
240
239
|
locality="San Francisco",
|
241
240
|
province="CA",
|
242
241
|
revoke=True)
|
243
|
-
example_secret_backend_intermediate_set_signed = vault.
|
242
|
+
example_secret_backend_intermediate_set_signed = vault.pkisecret.SecretBackendIntermediateSetSigned("example",
|
244
243
|
backend=intermediate.path,
|
245
244
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
246
245
|
```
|
247
246
|
|
248
247
|
:param str resource_name: The name of the resource.
|
249
248
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
250
|
-
:param pulumi.Input[
|
251
|
-
:param pulumi.Input[
|
249
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
250
|
+
:param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
|
252
251
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
253
252
|
issue and sign operations.
|
254
|
-
:param pulumi.Input[
|
253
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
255
254
|
The value should not contain leading or trailing forward slashes.
|
256
255
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
257
256
|
*Available only for Vault Enterprise*.
|
@@ -281,7 +280,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
281
280
|
description="intermediate",
|
282
281
|
default_lease_ttl_seconds=86400,
|
283
282
|
max_lease_ttl_seconds=86400)
|
284
|
-
example = vault.
|
283
|
+
example = vault.pkisecret.SecretBackendRootCert("example",
|
285
284
|
backend=root.path,
|
286
285
|
type="internal",
|
287
286
|
common_name="RootOrg Root CA",
|
@@ -296,11 +295,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
296
295
|
country="US",
|
297
296
|
locality="San Francisco",
|
298
297
|
province="CA")
|
299
|
-
example_secret_backend_intermediate_cert_request = vault.
|
298
|
+
example_secret_backend_intermediate_cert_request = vault.pkisecret.SecretBackendIntermediateCertRequest("example",
|
300
299
|
backend=intermediate.path,
|
301
300
|
type=example.type,
|
302
301
|
common_name="SubOrg Intermediate CA")
|
303
|
-
example_secret_backend_root_sign_intermediate = vault.
|
302
|
+
example_secret_backend_root_sign_intermediate = vault.pkisecret.SecretBackendRootSignIntermediate("example",
|
304
303
|
backend=root.path,
|
305
304
|
csr=example_secret_backend_intermediate_cert_request.csr,
|
306
305
|
common_name="SubOrg Intermediate CA",
|
@@ -311,7 +310,7 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
311
310
|
locality="San Francisco",
|
312
311
|
province="CA",
|
313
312
|
revoke=True)
|
314
|
-
example_secret_backend_intermediate_set_signed = vault.
|
313
|
+
example_secret_backend_intermediate_set_signed = vault.pkisecret.SecretBackendIntermediateSetSigned("example",
|
315
314
|
backend=intermediate.path,
|
316
315
|
certificate=example_secret_backend_root_sign_intermediate.certificate)
|
317
316
|
```
|
@@ -331,9 +330,9 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
331
330
|
def _internal_init(__self__,
|
332
331
|
resource_name: str,
|
333
332
|
opts: Optional[pulumi.ResourceOptions] = None,
|
334
|
-
backend: Optional[pulumi.Input[
|
335
|
-
certificate: Optional[pulumi.Input[
|
336
|
-
namespace: Optional[pulumi.Input[
|
333
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
334
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
335
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
337
336
|
__props__=None):
|
338
337
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
339
338
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -362,11 +361,11 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
362
361
|
def get(resource_name: str,
|
363
362
|
id: pulumi.Input[str],
|
364
363
|
opts: Optional[pulumi.ResourceOptions] = None,
|
365
|
-
backend: Optional[pulumi.Input[
|
366
|
-
certificate: Optional[pulumi.Input[
|
367
|
-
imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
368
|
-
imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
369
|
-
namespace: Optional[pulumi.Input[
|
364
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
365
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
367
|
+
imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
368
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendIntermediateSetSigned':
|
370
369
|
"""
|
371
370
|
Get an existing SecretBackendIntermediateSetSigned resource's state with the given name, id, and optional extra
|
372
371
|
properties used to qualify the lookup.
|
@@ -374,14 +373,14 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
374
373
|
:param str resource_name: The unique name of the resulting resource.
|
375
374
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
376
375
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
377
|
-
:param pulumi.Input[
|
378
|
-
:param pulumi.Input[
|
376
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
377
|
+
:param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
|
379
378
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
380
379
|
issue and sign operations.
|
381
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
380
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_issuers: The imported issuers indicating which issuers were created as part of
|
382
381
|
this request.
|
383
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
384
|
-
:param pulumi.Input[
|
382
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
|
383
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
385
384
|
The value should not contain leading or trailing forward slashes.
|
386
385
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
387
386
|
*Available only for Vault Enterprise*.
|
@@ -397,17 +396,17 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
397
396
|
__props__.__dict__["namespace"] = namespace
|
398
397
|
return SecretBackendIntermediateSetSigned(resource_name, opts=opts, __props__=__props__)
|
399
398
|
|
400
|
-
@property
|
399
|
+
@_builtins.property
|
401
400
|
@pulumi.getter
|
402
|
-
def backend(self) -> pulumi.Output[
|
401
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
403
402
|
"""
|
404
403
|
The PKI secret backend the resource belongs to.
|
405
404
|
"""
|
406
405
|
return pulumi.get(self, "backend")
|
407
406
|
|
408
|
-
@property
|
407
|
+
@_builtins.property
|
409
408
|
@pulumi.getter
|
410
|
-
def certificate(self) -> pulumi.Output[
|
409
|
+
def certificate(self) -> pulumi.Output[_builtins.str]:
|
411
410
|
"""
|
412
411
|
Specifies the PEM encoded certificate. May optionally append additional
|
413
412
|
CA certificates to populate the whole chain, which will then enable returning the full chain from
|
@@ -415,26 +414,26 @@ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
|
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "certificate")
|
417
416
|
|
418
|
-
@property
|
417
|
+
@_builtins.property
|
419
418
|
@pulumi.getter(name="importedIssuers")
|
420
|
-
def imported_issuers(self) -> pulumi.Output[Sequence[
|
419
|
+
def imported_issuers(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
421
420
|
"""
|
422
421
|
The imported issuers indicating which issuers were created as part of
|
423
422
|
this request.
|
424
423
|
"""
|
425
424
|
return pulumi.get(self, "imported_issuers")
|
426
425
|
|
427
|
-
@property
|
426
|
+
@_builtins.property
|
428
427
|
@pulumi.getter(name="importedKeys")
|
429
|
-
def imported_keys(self) -> pulumi.Output[Sequence[
|
428
|
+
def imported_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
430
429
|
"""
|
431
430
|
The imported keys indicating which keys were created as part of this request.
|
432
431
|
"""
|
433
432
|
return pulumi.get(self, "imported_keys")
|
434
433
|
|
435
|
-
@property
|
434
|
+
@_builtins.property
|
436
435
|
@pulumi.getter
|
437
|
-
def namespace(self) -> pulumi.Output[Optional[
|
436
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
438
437
|
"""
|
439
438
|
The namespace to provision the resource in.
|
440
439
|
The value should not contain leading or trailing forward slashes.
|