pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,23 +19,23 @@ __all__ = ['SecretBackendConfigUrlsArgs', 'SecretBackendConfigUrls']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendConfigUrlsArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
enable_templating: Optional[pulumi.Input[
|
26
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
enable_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a SecretBackendConfigUrls resource.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
31
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
32
|
+
:param pulumi.Input[_builtins.bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
34
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
36
35
|
The value should not contain leading or trailing forward slashes.
|
37
36
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
37
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
40
39
|
"""
|
41
40
|
pulumi.set(__self__, "backend", backend)
|
42
41
|
if crl_distribution_points is not None:
|
@@ -50,57 +49,57 @@ class SecretBackendConfigUrlsArgs:
|
|
50
49
|
if ocsp_servers is not None:
|
51
50
|
pulumi.set(__self__, "ocsp_servers", ocsp_servers)
|
52
51
|
|
53
|
-
@property
|
52
|
+
@_builtins.property
|
54
53
|
@pulumi.getter
|
55
|
-
def backend(self) -> pulumi.Input[
|
54
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
56
55
|
"""
|
57
56
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
58
57
|
"""
|
59
58
|
return pulumi.get(self, "backend")
|
60
59
|
|
61
60
|
@backend.setter
|
62
|
-
def backend(self, value: pulumi.Input[
|
61
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
63
62
|
pulumi.set(self, "backend", value)
|
64
63
|
|
65
|
-
@property
|
64
|
+
@_builtins.property
|
66
65
|
@pulumi.getter(name="crlDistributionPoints")
|
67
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
66
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
68
67
|
"""
|
69
68
|
Specifies the URL values for the CRL Distribution Points field.
|
70
69
|
"""
|
71
70
|
return pulumi.get(self, "crl_distribution_points")
|
72
71
|
|
73
72
|
@crl_distribution_points.setter
|
74
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
73
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
75
74
|
pulumi.set(self, "crl_distribution_points", value)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter(name="enableTemplating")
|
79
|
-
def enable_templating(self) -> Optional[pulumi.Input[
|
78
|
+
def enable_templating(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
80
79
|
"""
|
81
80
|
Specifies that templating of AIA fields is allowed.
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "enable_templating")
|
84
83
|
|
85
84
|
@enable_templating.setter
|
86
|
-
def enable_templating(self, value: Optional[pulumi.Input[
|
85
|
+
def enable_templating(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
87
86
|
pulumi.set(self, "enable_templating", value)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter(name="issuingCertificates")
|
91
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
90
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
92
91
|
"""
|
93
92
|
Specifies the URL values for the Issuing Certificate field.
|
94
93
|
"""
|
95
94
|
return pulumi.get(self, "issuing_certificates")
|
96
95
|
|
97
96
|
@issuing_certificates.setter
|
98
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
99
98
|
pulumi.set(self, "issuing_certificates", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter
|
103
|
-
def namespace(self) -> Optional[pulumi.Input[
|
102
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
104
103
|
"""
|
105
104
|
The namespace to provision the resource in.
|
106
105
|
The value should not contain leading or trailing forward slashes.
|
@@ -110,42 +109,42 @@ class SecretBackendConfigUrlsArgs:
|
|
110
109
|
return pulumi.get(self, "namespace")
|
111
110
|
|
112
111
|
@namespace.setter
|
113
|
-
def namespace(self, value: Optional[pulumi.Input[
|
112
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
114
113
|
pulumi.set(self, "namespace", value)
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="ocspServers")
|
118
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
117
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
119
118
|
"""
|
120
119
|
Specifies the URL values for the OCSP Servers field.
|
121
120
|
"""
|
122
121
|
return pulumi.get(self, "ocsp_servers")
|
123
122
|
|
124
123
|
@ocsp_servers.setter
|
125
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
124
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
126
125
|
pulumi.set(self, "ocsp_servers", value)
|
127
126
|
|
128
127
|
|
129
128
|
@pulumi.input_type
|
130
129
|
class _SecretBackendConfigUrlsState:
|
131
130
|
def __init__(__self__, *,
|
132
|
-
backend: Optional[pulumi.Input[
|
133
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
-
enable_templating: Optional[pulumi.Input[
|
135
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
136
|
-
namespace: Optional[pulumi.Input[
|
137
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
131
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
132
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
133
|
+
enable_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
134
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
135
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
136
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
138
137
|
"""
|
139
138
|
Input properties used for looking up and filtering SecretBackendConfigUrls resources.
|
140
|
-
:param pulumi.Input[
|
141
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
142
|
-
:param pulumi.Input[
|
143
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
144
|
-
:param pulumi.Input[
|
139
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
140
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
141
|
+
:param pulumi.Input[_builtins.bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
142
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
143
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
145
144
|
The value should not contain leading or trailing forward slashes.
|
146
145
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
146
|
*Available only for Vault Enterprise*.
|
148
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
147
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
149
148
|
"""
|
150
149
|
if backend is not None:
|
151
150
|
pulumi.set(__self__, "backend", backend)
|
@@ -160,57 +159,57 @@ class _SecretBackendConfigUrlsState:
|
|
160
159
|
if ocsp_servers is not None:
|
161
160
|
pulumi.set(__self__, "ocsp_servers", ocsp_servers)
|
162
161
|
|
163
|
-
@property
|
162
|
+
@_builtins.property
|
164
163
|
@pulumi.getter
|
165
|
-
def backend(self) -> Optional[pulumi.Input[
|
164
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
166
165
|
"""
|
167
166
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
168
167
|
"""
|
169
168
|
return pulumi.get(self, "backend")
|
170
169
|
|
171
170
|
@backend.setter
|
172
|
-
def backend(self, value: Optional[pulumi.Input[
|
171
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
173
172
|
pulumi.set(self, "backend", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter(name="crlDistributionPoints")
|
177
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
176
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
178
177
|
"""
|
179
178
|
Specifies the URL values for the CRL Distribution Points field.
|
180
179
|
"""
|
181
180
|
return pulumi.get(self, "crl_distribution_points")
|
182
181
|
|
183
182
|
@crl_distribution_points.setter
|
184
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
183
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
185
184
|
pulumi.set(self, "crl_distribution_points", value)
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter(name="enableTemplating")
|
189
|
-
def enable_templating(self) -> Optional[pulumi.Input[
|
188
|
+
def enable_templating(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
190
189
|
"""
|
191
190
|
Specifies that templating of AIA fields is allowed.
|
192
191
|
"""
|
193
192
|
return pulumi.get(self, "enable_templating")
|
194
193
|
|
195
194
|
@enable_templating.setter
|
196
|
-
def enable_templating(self, value: Optional[pulumi.Input[
|
195
|
+
def enable_templating(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
197
196
|
pulumi.set(self, "enable_templating", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter(name="issuingCertificates")
|
201
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
200
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
202
201
|
"""
|
203
202
|
Specifies the URL values for the Issuing Certificate field.
|
204
203
|
"""
|
205
204
|
return pulumi.get(self, "issuing_certificates")
|
206
205
|
|
207
206
|
@issuing_certificates.setter
|
208
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
207
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
209
208
|
pulumi.set(self, "issuing_certificates", value)
|
210
209
|
|
211
|
-
@property
|
210
|
+
@_builtins.property
|
212
211
|
@pulumi.getter
|
213
|
-
def namespace(self) -> Optional[pulumi.Input[
|
212
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
214
213
|
"""
|
215
214
|
The namespace to provision the resource in.
|
216
215
|
The value should not contain leading or trailing forward slashes.
|
@@ -220,19 +219,19 @@ class _SecretBackendConfigUrlsState:
|
|
220
219
|
return pulumi.get(self, "namespace")
|
221
220
|
|
222
221
|
@namespace.setter
|
223
|
-
def namespace(self, value: Optional[pulumi.Input[
|
222
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
224
223
|
pulumi.set(self, "namespace", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="ocspServers")
|
228
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
227
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
229
228
|
"""
|
230
229
|
Specifies the URL values for the OCSP Servers field.
|
231
230
|
"""
|
232
231
|
return pulumi.get(self, "ocsp_servers")
|
233
232
|
|
234
233
|
@ocsp_servers.setter
|
235
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
234
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
236
235
|
pulumi.set(self, "ocsp_servers", value)
|
237
236
|
|
238
237
|
|
@@ -242,12 +241,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
242
241
|
def __init__(__self__,
|
243
242
|
resource_name: str,
|
244
243
|
opts: Optional[pulumi.ResourceOptions] = None,
|
245
|
-
backend: Optional[pulumi.Input[
|
246
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
247
|
-
enable_templating: Optional[pulumi.Input[
|
248
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
249
|
-
namespace: Optional[pulumi.Input[
|
250
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
244
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
245
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
246
|
+
enable_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
247
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
248
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
249
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
251
250
|
__props__=None):
|
252
251
|
"""
|
253
252
|
Allows setting the issuing certificate endpoints, CRL distribution points, and OCSP server endpoints that will be encoded into issued certificates.
|
@@ -264,7 +263,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
264
263
|
description="root PKI",
|
265
264
|
default_lease_ttl_seconds=8640000,
|
266
265
|
max_lease_ttl_seconds=8640000)
|
267
|
-
example = vault.
|
266
|
+
example = vault.pkisecret.SecretBackendConfigUrls("example",
|
268
267
|
backend=root.path,
|
269
268
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
270
269
|
```
|
@@ -281,15 +280,15 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
281
280
|
|
282
281
|
:param str resource_name: The name of the resource.
|
283
282
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
284
|
-
:param pulumi.Input[
|
285
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
286
|
-
:param pulumi.Input[
|
287
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
288
|
-
:param pulumi.Input[
|
283
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
284
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
285
|
+
:param pulumi.Input[_builtins.bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
286
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
287
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
289
288
|
The value should not contain leading or trailing forward slashes.
|
290
289
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
291
290
|
*Available only for Vault Enterprise*.
|
292
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
291
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
293
292
|
"""
|
294
293
|
...
|
295
294
|
@overload
|
@@ -312,7 +311,7 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
312
311
|
description="root PKI",
|
313
312
|
default_lease_ttl_seconds=8640000,
|
314
313
|
max_lease_ttl_seconds=8640000)
|
315
|
-
example = vault.
|
314
|
+
example = vault.pkisecret.SecretBackendConfigUrls("example",
|
316
315
|
backend=root.path,
|
317
316
|
issuing_certificates=["http://127.0.0.1:8200/v1/pki/ca"])
|
318
317
|
```
|
@@ -342,12 +341,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
342
341
|
def _internal_init(__self__,
|
343
342
|
resource_name: str,
|
344
343
|
opts: Optional[pulumi.ResourceOptions] = None,
|
345
|
-
backend: Optional[pulumi.Input[
|
346
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
347
|
-
enable_templating: Optional[pulumi.Input[
|
348
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
349
|
-
namespace: Optional[pulumi.Input[
|
350
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
344
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
346
|
+
enable_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
347
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
348
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
349
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
351
350
|
__props__=None):
|
352
351
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
353
352
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -375,12 +374,12 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
375
374
|
def get(resource_name: str,
|
376
375
|
id: pulumi.Input[str],
|
377
376
|
opts: Optional[pulumi.ResourceOptions] = None,
|
378
|
-
backend: Optional[pulumi.Input[
|
379
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
380
|
-
enable_templating: Optional[pulumi.Input[
|
381
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
382
|
-
namespace: Optional[pulumi.Input[
|
383
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
377
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
378
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
379
|
+
enable_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
380
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
381
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
382
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretBackendConfigUrls':
|
384
383
|
"""
|
385
384
|
Get an existing SecretBackendConfigUrls resource's state with the given name, id, and optional extra
|
386
385
|
properties used to qualify the lookup.
|
@@ -388,15 +387,15 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
388
387
|
:param str resource_name: The unique name of the resulting resource.
|
389
388
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
390
389
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
391
|
-
:param pulumi.Input[
|
392
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
393
|
-
:param pulumi.Input[
|
394
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
395
|
-
:param pulumi.Input[
|
390
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
391
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL Distribution Points field.
|
392
|
+
:param pulumi.Input[_builtins.bool] enable_templating: Specifies that templating of AIA fields is allowed.
|
393
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing Certificate field.
|
394
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
396
395
|
The value should not contain leading or trailing forward slashes.
|
397
396
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
398
397
|
*Available only for Vault Enterprise*.
|
399
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
398
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
400
399
|
"""
|
401
400
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
402
401
|
|
@@ -410,41 +409,41 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
410
409
|
__props__.__dict__["ocsp_servers"] = ocsp_servers
|
411
410
|
return SecretBackendConfigUrls(resource_name, opts=opts, __props__=__props__)
|
412
411
|
|
413
|
-
@property
|
412
|
+
@_builtins.property
|
414
413
|
@pulumi.getter
|
415
|
-
def backend(self) -> pulumi.Output[
|
414
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
416
415
|
"""
|
417
416
|
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
418
417
|
"""
|
419
418
|
return pulumi.get(self, "backend")
|
420
419
|
|
421
|
-
@property
|
420
|
+
@_builtins.property
|
422
421
|
@pulumi.getter(name="crlDistributionPoints")
|
423
|
-
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[
|
422
|
+
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
424
423
|
"""
|
425
424
|
Specifies the URL values for the CRL Distribution Points field.
|
426
425
|
"""
|
427
426
|
return pulumi.get(self, "crl_distribution_points")
|
428
427
|
|
429
|
-
@property
|
428
|
+
@_builtins.property
|
430
429
|
@pulumi.getter(name="enableTemplating")
|
431
|
-
def enable_templating(self) -> pulumi.Output[Optional[
|
430
|
+
def enable_templating(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
432
431
|
"""
|
433
432
|
Specifies that templating of AIA fields is allowed.
|
434
433
|
"""
|
435
434
|
return pulumi.get(self, "enable_templating")
|
436
435
|
|
437
|
-
@property
|
436
|
+
@_builtins.property
|
438
437
|
@pulumi.getter(name="issuingCertificates")
|
439
|
-
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[
|
438
|
+
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
440
439
|
"""
|
441
440
|
Specifies the URL values for the Issuing Certificate field.
|
442
441
|
"""
|
443
442
|
return pulumi.get(self, "issuing_certificates")
|
444
443
|
|
445
|
-
@property
|
444
|
+
@_builtins.property
|
446
445
|
@pulumi.getter
|
447
|
-
def namespace(self) -> pulumi.Output[Optional[
|
446
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
448
447
|
"""
|
449
448
|
The namespace to provision the resource in.
|
450
449
|
The value should not contain leading or trailing forward slashes.
|
@@ -453,9 +452,9 @@ class SecretBackendConfigUrls(pulumi.CustomResource):
|
|
453
452
|
"""
|
454
453
|
return pulumi.get(self, "namespace")
|
455
454
|
|
456
|
-
@property
|
455
|
+
@_builtins.property
|
457
456
|
@pulumi.getter(name="ocspServers")
|
458
|
-
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[
|
457
|
+
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
459
458
|
"""
|
460
459
|
Specifies the URL values for the OCSP Servers field.
|
461
460
|
"""
|