pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,61 +19,61 @@ __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendIssuerArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
issuer_ref: pulumi.Input[
|
25
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
disable_critical_extension_checks: Optional[pulumi.Input[
|
27
|
-
disable_name_checks: Optional[pulumi.Input[
|
28
|
-
disable_name_constraint_checks: Optional[pulumi.Input[
|
29
|
-
disable_path_length_checks: Optional[pulumi.Input[
|
30
|
-
enable_aia_url_templating: Optional[pulumi.Input[
|
31
|
-
issuer_name: Optional[pulumi.Input[
|
32
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
leaf_not_after_behavior: Optional[pulumi.Input[
|
34
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[
|
35
|
-
namespace: Optional[pulumi.Input[
|
36
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
37
|
-
revocation_signature_algorithm: Optional[pulumi.Input[
|
38
|
-
usage: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
issuer_ref: pulumi.Input[_builtins.str],
|
24
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
disable_critical_extension_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
disable_name_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
27
|
+
disable_name_constraint_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
disable_path_length_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
29
|
+
enable_aia_url_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
issuer_name: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
leaf_not_after_behavior: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
34
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
35
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
36
|
+
revocation_signature_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
usage: Optional[pulumi.Input[_builtins.str]] = None):
|
39
38
|
"""
|
40
39
|
The set of arguments for constructing a SecretBackendIssuer resource.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
42
41
|
leading or trailing `/`s.
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
42
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Reference to an existing issuer.
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
45
44
|
Distribution Points field.
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.bool] disable_critical_extension_checks: This determines whether this
|
47
46
|
issuer is able to issue certificates where the chain of trust (including the
|
48
47
|
issued certificate) contain critical extensions not processed by Vault.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.bool] disable_name_checks: This determines whether this issuer is able
|
50
49
|
to issue certificates where the chain of trust (including the final issued
|
51
50
|
certificate) contains a link in which the subject of the issuing certificate
|
52
51
|
does not match the named issuer of the certificate it signed.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.bool] disable_name_constraint_checks: This determines whether this
|
54
53
|
issuer is able to issue certificates where the chain of trust (including the
|
55
54
|
final issued certificate) violates the name constraints critical extension of
|
56
55
|
one of the issuer certificates in the chain.
|
57
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.bool] disable_path_length_checks: This determines whether this issuer
|
58
57
|
is able to issue certificates where the chain of trust (including the final
|
59
58
|
issued certificate) is longer than allowed by a certificate authority in that
|
60
59
|
chain.
|
61
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
62
61
|
be templated.
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
62
|
+
:param pulumi.Input[_builtins.str] issuer_name: Name of the issuer.
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
65
64
|
Certificate field.
|
66
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
67
66
|
issuance.
|
68
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
69
68
|
computed CAChain field from, when non-empty.
|
70
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
71
70
|
The value should not contain leading or trailing forward slashes.
|
72
71
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
72
|
*Available only for Vault Enterprise*.
|
74
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
74
|
+
:param pulumi.Input[_builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
76
75
|
when building CRLs.
|
77
|
-
:param pulumi.Input[
|
76
|
+
:param pulumi.Input[_builtins.str] usage: Allowed usages for this issuer.
|
78
77
|
"""
|
79
78
|
pulumi.set(__self__, "backend", backend)
|
80
79
|
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
@@ -107,9 +106,9 @@ class SecretBackendIssuerArgs:
|
|
107
106
|
if usage is not None:
|
108
107
|
pulumi.set(__self__, "usage", usage)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def backend(self) -> pulumi.Input[
|
111
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
113
112
|
"""
|
114
113
|
The path the PKI secret backend is mounted at, with no
|
115
114
|
leading or trailing `/`s.
|
@@ -117,24 +116,24 @@ class SecretBackendIssuerArgs:
|
|
117
116
|
return pulumi.get(self, "backend")
|
118
117
|
|
119
118
|
@backend.setter
|
120
|
-
def backend(self, value: pulumi.Input[
|
119
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
121
120
|
pulumi.set(self, "backend", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter(name="issuerRef")
|
125
|
-
def issuer_ref(self) -> pulumi.Input[
|
124
|
+
def issuer_ref(self) -> pulumi.Input[_builtins.str]:
|
126
125
|
"""
|
127
126
|
Reference to an existing issuer.
|
128
127
|
"""
|
129
128
|
return pulumi.get(self, "issuer_ref")
|
130
129
|
|
131
130
|
@issuer_ref.setter
|
132
|
-
def issuer_ref(self, value: pulumi.Input[
|
131
|
+
def issuer_ref(self, value: pulumi.Input[_builtins.str]):
|
133
132
|
pulumi.set(self, "issuer_ref", value)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter(name="crlDistributionPoints")
|
137
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
136
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
138
137
|
"""
|
139
138
|
Specifies the URL values for the CRL
|
140
139
|
Distribution Points field.
|
@@ -142,12 +141,12 @@ class SecretBackendIssuerArgs:
|
|
142
141
|
return pulumi.get(self, "crl_distribution_points")
|
143
142
|
|
144
143
|
@crl_distribution_points.setter
|
145
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
144
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
146
145
|
pulumi.set(self, "crl_distribution_points", value)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
150
|
-
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[
|
149
|
+
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
151
150
|
"""
|
152
151
|
This determines whether this
|
153
152
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -156,12 +155,12 @@ class SecretBackendIssuerArgs:
|
|
156
155
|
return pulumi.get(self, "disable_critical_extension_checks")
|
157
156
|
|
158
157
|
@disable_critical_extension_checks.setter
|
159
|
-
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[
|
158
|
+
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
160
159
|
pulumi.set(self, "disable_critical_extension_checks", value)
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
@pulumi.getter(name="disableNameChecks")
|
164
|
-
def disable_name_checks(self) -> Optional[pulumi.Input[
|
163
|
+
def disable_name_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
165
164
|
"""
|
166
165
|
This determines whether this issuer is able
|
167
166
|
to issue certificates where the chain of trust (including the final issued
|
@@ -171,12 +170,12 @@ class SecretBackendIssuerArgs:
|
|
171
170
|
return pulumi.get(self, "disable_name_checks")
|
172
171
|
|
173
172
|
@disable_name_checks.setter
|
174
|
-
def disable_name_checks(self, value: Optional[pulumi.Input[
|
173
|
+
def disable_name_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
175
174
|
pulumi.set(self, "disable_name_checks", value)
|
176
175
|
|
177
|
-
@property
|
176
|
+
@_builtins.property
|
178
177
|
@pulumi.getter(name="disableNameConstraintChecks")
|
179
|
-
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[
|
178
|
+
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
180
179
|
"""
|
181
180
|
This determines whether this
|
182
181
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -186,12 +185,12 @@ class SecretBackendIssuerArgs:
|
|
186
185
|
return pulumi.get(self, "disable_name_constraint_checks")
|
187
186
|
|
188
187
|
@disable_name_constraint_checks.setter
|
189
|
-
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[
|
188
|
+
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
190
189
|
pulumi.set(self, "disable_name_constraint_checks", value)
|
191
190
|
|
192
|
-
@property
|
191
|
+
@_builtins.property
|
193
192
|
@pulumi.getter(name="disablePathLengthChecks")
|
194
|
-
def disable_path_length_checks(self) -> Optional[pulumi.Input[
|
193
|
+
def disable_path_length_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
195
194
|
"""
|
196
195
|
This determines whether this issuer
|
197
196
|
is able to issue certificates where the chain of trust (including the final
|
@@ -201,12 +200,12 @@ class SecretBackendIssuerArgs:
|
|
201
200
|
return pulumi.get(self, "disable_path_length_checks")
|
202
201
|
|
203
202
|
@disable_path_length_checks.setter
|
204
|
-
def disable_path_length_checks(self, value: Optional[pulumi.Input[
|
203
|
+
def disable_path_length_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
205
204
|
pulumi.set(self, "disable_path_length_checks", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
209
|
-
def enable_aia_url_templating(self) -> Optional[pulumi.Input[
|
208
|
+
def enable_aia_url_templating(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
210
209
|
"""
|
211
210
|
Specifies that the AIA URL values should
|
212
211
|
be templated.
|
@@ -214,24 +213,24 @@ class SecretBackendIssuerArgs:
|
|
214
213
|
return pulumi.get(self, "enable_aia_url_templating")
|
215
214
|
|
216
215
|
@enable_aia_url_templating.setter
|
217
|
-
def enable_aia_url_templating(self, value: Optional[pulumi.Input[
|
216
|
+
def enable_aia_url_templating(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
218
217
|
pulumi.set(self, "enable_aia_url_templating", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="issuerName")
|
222
|
-
def issuer_name(self) -> Optional[pulumi.Input[
|
221
|
+
def issuer_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
222
|
"""
|
224
223
|
Name of the issuer.
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "issuer_name")
|
227
226
|
|
228
227
|
@issuer_name.setter
|
229
|
-
def issuer_name(self, value: Optional[pulumi.Input[
|
228
|
+
def issuer_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
230
229
|
pulumi.set(self, "issuer_name", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter(name="issuingCertificates")
|
234
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
233
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
235
234
|
"""
|
236
235
|
Specifies the URL values for the Issuing
|
237
236
|
Certificate field.
|
@@ -239,12 +238,12 @@ class SecretBackendIssuerArgs:
|
|
239
238
|
return pulumi.get(self, "issuing_certificates")
|
240
239
|
|
241
240
|
@issuing_certificates.setter
|
242
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
241
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
243
242
|
pulumi.set(self, "issuing_certificates", value)
|
244
243
|
|
245
|
-
@property
|
244
|
+
@_builtins.property
|
246
245
|
@pulumi.getter(name="leafNotAfterBehavior")
|
247
|
-
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[
|
246
|
+
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[_builtins.str]]:
|
248
247
|
"""
|
249
248
|
Behavior of a leaf's NotAfter field during
|
250
249
|
issuance.
|
@@ -252,12 +251,12 @@ class SecretBackendIssuerArgs:
|
|
252
251
|
return pulumi.get(self, "leaf_not_after_behavior")
|
253
252
|
|
254
253
|
@leaf_not_after_behavior.setter
|
255
|
-
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[
|
254
|
+
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[_builtins.str]]):
|
256
255
|
pulumi.set(self, "leaf_not_after_behavior", value)
|
257
256
|
|
258
|
-
@property
|
257
|
+
@_builtins.property
|
259
258
|
@pulumi.getter(name="manualChains")
|
260
|
-
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
259
|
+
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
261
260
|
"""
|
262
261
|
Chain of issuer references to build this issuer's
|
263
262
|
computed CAChain field from, when non-empty.
|
@@ -265,12 +264,12 @@ class SecretBackendIssuerArgs:
|
|
265
264
|
return pulumi.get(self, "manual_chains")
|
266
265
|
|
267
266
|
@manual_chains.setter
|
268
|
-
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
267
|
+
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
269
268
|
pulumi.set(self, "manual_chains", value)
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter
|
273
|
-
def namespace(self) -> Optional[pulumi.Input[
|
272
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
274
273
|
"""
|
275
274
|
The namespace to provision the resource in.
|
276
275
|
The value should not contain leading or trailing forward slashes.
|
@@ -280,24 +279,24 @@ class SecretBackendIssuerArgs:
|
|
280
279
|
return pulumi.get(self, "namespace")
|
281
280
|
|
282
281
|
@namespace.setter
|
283
|
-
def namespace(self, value: Optional[pulumi.Input[
|
282
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
284
283
|
pulumi.set(self, "namespace", value)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter(name="ocspServers")
|
288
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
287
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
289
288
|
"""
|
290
289
|
Specifies the URL values for the OCSP Servers field.
|
291
290
|
"""
|
292
291
|
return pulumi.get(self, "ocsp_servers")
|
293
292
|
|
294
293
|
@ocsp_servers.setter
|
295
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
294
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
296
295
|
pulumi.set(self, "ocsp_servers", value)
|
297
296
|
|
298
|
-
@property
|
297
|
+
@_builtins.property
|
299
298
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
300
|
-
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[
|
299
|
+
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
301
300
|
"""
|
302
301
|
Which signature algorithm to use
|
303
302
|
when building CRLs.
|
@@ -305,82 +304,82 @@ class SecretBackendIssuerArgs:
|
|
305
304
|
return pulumi.get(self, "revocation_signature_algorithm")
|
306
305
|
|
307
306
|
@revocation_signature_algorithm.setter
|
308
|
-
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[
|
307
|
+
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
309
308
|
pulumi.set(self, "revocation_signature_algorithm", value)
|
310
309
|
|
311
|
-
@property
|
310
|
+
@_builtins.property
|
312
311
|
@pulumi.getter
|
313
|
-
def usage(self) -> Optional[pulumi.Input[
|
312
|
+
def usage(self) -> Optional[pulumi.Input[_builtins.str]]:
|
314
313
|
"""
|
315
314
|
Allowed usages for this issuer.
|
316
315
|
"""
|
317
316
|
return pulumi.get(self, "usage")
|
318
317
|
|
319
318
|
@usage.setter
|
320
|
-
def usage(self, value: Optional[pulumi.Input[
|
319
|
+
def usage(self, value: Optional[pulumi.Input[_builtins.str]]):
|
321
320
|
pulumi.set(self, "usage", value)
|
322
321
|
|
323
322
|
|
324
323
|
@pulumi.input_type
|
325
324
|
class _SecretBackendIssuerState:
|
326
325
|
def __init__(__self__, *,
|
327
|
-
backend: Optional[pulumi.Input[
|
328
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
329
|
-
disable_critical_extension_checks: Optional[pulumi.Input[
|
330
|
-
disable_name_checks: Optional[pulumi.Input[
|
331
|
-
disable_name_constraint_checks: Optional[pulumi.Input[
|
332
|
-
disable_path_length_checks: Optional[pulumi.Input[
|
333
|
-
enable_aia_url_templating: Optional[pulumi.Input[
|
334
|
-
issuer_id: Optional[pulumi.Input[
|
335
|
-
issuer_name: Optional[pulumi.Input[
|
336
|
-
issuer_ref: Optional[pulumi.Input[
|
337
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
338
|
-
leaf_not_after_behavior: Optional[pulumi.Input[
|
339
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[
|
340
|
-
namespace: Optional[pulumi.Input[
|
341
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
342
|
-
revocation_signature_algorithm: Optional[pulumi.Input[
|
343
|
-
usage: Optional[pulumi.Input[
|
326
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
327
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
328
|
+
disable_critical_extension_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
329
|
+
disable_name_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
330
|
+
disable_name_constraint_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
331
|
+
disable_path_length_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
332
|
+
enable_aia_url_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
333
|
+
issuer_id: Optional[pulumi.Input[_builtins.str]] = None,
|
334
|
+
issuer_name: Optional[pulumi.Input[_builtins.str]] = None,
|
335
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
336
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
337
|
+
leaf_not_after_behavior: Optional[pulumi.Input[_builtins.str]] = None,
|
338
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
339
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
341
|
+
revocation_signature_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
usage: Optional[pulumi.Input[_builtins.str]] = None):
|
344
343
|
"""
|
345
344
|
Input properties used for looking up and filtering SecretBackendIssuer resources.
|
346
|
-
:param pulumi.Input[
|
345
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
347
346
|
leading or trailing `/`s.
|
348
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
347
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
349
348
|
Distribution Points field.
|
350
|
-
:param pulumi.Input[
|
349
|
+
:param pulumi.Input[_builtins.bool] disable_critical_extension_checks: This determines whether this
|
351
350
|
issuer is able to issue certificates where the chain of trust (including the
|
352
351
|
issued certificate) contain critical extensions not processed by Vault.
|
353
|
-
:param pulumi.Input[
|
352
|
+
:param pulumi.Input[_builtins.bool] disable_name_checks: This determines whether this issuer is able
|
354
353
|
to issue certificates where the chain of trust (including the final issued
|
355
354
|
certificate) contains a link in which the subject of the issuing certificate
|
356
355
|
does not match the named issuer of the certificate it signed.
|
357
|
-
:param pulumi.Input[
|
356
|
+
:param pulumi.Input[_builtins.bool] disable_name_constraint_checks: This determines whether this
|
358
357
|
issuer is able to issue certificates where the chain of trust (including the
|
359
358
|
final issued certificate) violates the name constraints critical extension of
|
360
359
|
one of the issuer certificates in the chain.
|
361
|
-
:param pulumi.Input[
|
360
|
+
:param pulumi.Input[_builtins.bool] disable_path_length_checks: This determines whether this issuer
|
362
361
|
is able to issue certificates where the chain of trust (including the final
|
363
362
|
issued certificate) is longer than allowed by a certificate authority in that
|
364
363
|
chain.
|
365
|
-
:param pulumi.Input[
|
364
|
+
:param pulumi.Input[_builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
366
365
|
be templated.
|
367
|
-
:param pulumi.Input[
|
368
|
-
:param pulumi.Input[
|
369
|
-
:param pulumi.Input[
|
370
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
366
|
+
:param pulumi.Input[_builtins.str] issuer_id: ID of the issuer.
|
367
|
+
:param pulumi.Input[_builtins.str] issuer_name: Name of the issuer.
|
368
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Reference to an existing issuer.
|
369
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
371
370
|
Certificate field.
|
372
|
-
:param pulumi.Input[
|
371
|
+
:param pulumi.Input[_builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
373
372
|
issuance.
|
374
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
373
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
375
374
|
computed CAChain field from, when non-empty.
|
376
|
-
:param pulumi.Input[
|
375
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
377
376
|
The value should not contain leading or trailing forward slashes.
|
378
377
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
379
378
|
*Available only for Vault Enterprise*.
|
380
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
381
|
-
:param pulumi.Input[
|
379
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
380
|
+
:param pulumi.Input[_builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
382
381
|
when building CRLs.
|
383
|
-
:param pulumi.Input[
|
382
|
+
:param pulumi.Input[_builtins.str] usage: Allowed usages for this issuer.
|
384
383
|
"""
|
385
384
|
if backend is not None:
|
386
385
|
pulumi.set(__self__, "backend", backend)
|
@@ -417,9 +416,9 @@ class _SecretBackendIssuerState:
|
|
417
416
|
if usage is not None:
|
418
417
|
pulumi.set(__self__, "usage", usage)
|
419
418
|
|
420
|
-
@property
|
419
|
+
@_builtins.property
|
421
420
|
@pulumi.getter
|
422
|
-
def backend(self) -> Optional[pulumi.Input[
|
421
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
423
422
|
"""
|
424
423
|
The path the PKI secret backend is mounted at, with no
|
425
424
|
leading or trailing `/`s.
|
@@ -427,12 +426,12 @@ class _SecretBackendIssuerState:
|
|
427
426
|
return pulumi.get(self, "backend")
|
428
427
|
|
429
428
|
@backend.setter
|
430
|
-
def backend(self, value: Optional[pulumi.Input[
|
429
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
431
430
|
pulumi.set(self, "backend", value)
|
432
431
|
|
433
|
-
@property
|
432
|
+
@_builtins.property
|
434
433
|
@pulumi.getter(name="crlDistributionPoints")
|
435
|
-
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
434
|
+
def crl_distribution_points(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
436
435
|
"""
|
437
436
|
Specifies the URL values for the CRL
|
438
437
|
Distribution Points field.
|
@@ -440,12 +439,12 @@ class _SecretBackendIssuerState:
|
|
440
439
|
return pulumi.get(self, "crl_distribution_points")
|
441
440
|
|
442
441
|
@crl_distribution_points.setter
|
443
|
-
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
442
|
+
def crl_distribution_points(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
444
443
|
pulumi.set(self, "crl_distribution_points", value)
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
448
|
-
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[
|
447
|
+
def disable_critical_extension_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
449
448
|
"""
|
450
449
|
This determines whether this
|
451
450
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -454,12 +453,12 @@ class _SecretBackendIssuerState:
|
|
454
453
|
return pulumi.get(self, "disable_critical_extension_checks")
|
455
454
|
|
456
455
|
@disable_critical_extension_checks.setter
|
457
|
-
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[
|
456
|
+
def disable_critical_extension_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
458
457
|
pulumi.set(self, "disable_critical_extension_checks", value)
|
459
458
|
|
460
|
-
@property
|
459
|
+
@_builtins.property
|
461
460
|
@pulumi.getter(name="disableNameChecks")
|
462
|
-
def disable_name_checks(self) -> Optional[pulumi.Input[
|
461
|
+
def disable_name_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
463
462
|
"""
|
464
463
|
This determines whether this issuer is able
|
465
464
|
to issue certificates where the chain of trust (including the final issued
|
@@ -469,12 +468,12 @@ class _SecretBackendIssuerState:
|
|
469
468
|
return pulumi.get(self, "disable_name_checks")
|
470
469
|
|
471
470
|
@disable_name_checks.setter
|
472
|
-
def disable_name_checks(self, value: Optional[pulumi.Input[
|
471
|
+
def disable_name_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
473
472
|
pulumi.set(self, "disable_name_checks", value)
|
474
473
|
|
475
|
-
@property
|
474
|
+
@_builtins.property
|
476
475
|
@pulumi.getter(name="disableNameConstraintChecks")
|
477
|
-
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[
|
476
|
+
def disable_name_constraint_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
478
477
|
"""
|
479
478
|
This determines whether this
|
480
479
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -484,12 +483,12 @@ class _SecretBackendIssuerState:
|
|
484
483
|
return pulumi.get(self, "disable_name_constraint_checks")
|
485
484
|
|
486
485
|
@disable_name_constraint_checks.setter
|
487
|
-
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[
|
486
|
+
def disable_name_constraint_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
488
487
|
pulumi.set(self, "disable_name_constraint_checks", value)
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter(name="disablePathLengthChecks")
|
492
|
-
def disable_path_length_checks(self) -> Optional[pulumi.Input[
|
491
|
+
def disable_path_length_checks(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
493
492
|
"""
|
494
493
|
This determines whether this issuer
|
495
494
|
is able to issue certificates where the chain of trust (including the final
|
@@ -499,12 +498,12 @@ class _SecretBackendIssuerState:
|
|
499
498
|
return pulumi.get(self, "disable_path_length_checks")
|
500
499
|
|
501
500
|
@disable_path_length_checks.setter
|
502
|
-
def disable_path_length_checks(self, value: Optional[pulumi.Input[
|
501
|
+
def disable_path_length_checks(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
503
502
|
pulumi.set(self, "disable_path_length_checks", value)
|
504
503
|
|
505
|
-
@property
|
504
|
+
@_builtins.property
|
506
505
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
507
|
-
def enable_aia_url_templating(self) -> Optional[pulumi.Input[
|
506
|
+
def enable_aia_url_templating(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
508
507
|
"""
|
509
508
|
Specifies that the AIA URL values should
|
510
509
|
be templated.
|
@@ -512,48 +511,48 @@ class _SecretBackendIssuerState:
|
|
512
511
|
return pulumi.get(self, "enable_aia_url_templating")
|
513
512
|
|
514
513
|
@enable_aia_url_templating.setter
|
515
|
-
def enable_aia_url_templating(self, value: Optional[pulumi.Input[
|
514
|
+
def enable_aia_url_templating(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
516
515
|
pulumi.set(self, "enable_aia_url_templating", value)
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter(name="issuerId")
|
520
|
-
def issuer_id(self) -> Optional[pulumi.Input[
|
519
|
+
def issuer_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
521
520
|
"""
|
522
521
|
ID of the issuer.
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "issuer_id")
|
525
524
|
|
526
525
|
@issuer_id.setter
|
527
|
-
def issuer_id(self, value: Optional[pulumi.Input[
|
526
|
+
def issuer_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
528
527
|
pulumi.set(self, "issuer_id", value)
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter(name="issuerName")
|
532
|
-
def issuer_name(self) -> Optional[pulumi.Input[
|
531
|
+
def issuer_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
533
532
|
"""
|
534
533
|
Name of the issuer.
|
535
534
|
"""
|
536
535
|
return pulumi.get(self, "issuer_name")
|
537
536
|
|
538
537
|
@issuer_name.setter
|
539
|
-
def issuer_name(self, value: Optional[pulumi.Input[
|
538
|
+
def issuer_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
540
539
|
pulumi.set(self, "issuer_name", value)
|
541
540
|
|
542
|
-
@property
|
541
|
+
@_builtins.property
|
543
542
|
@pulumi.getter(name="issuerRef")
|
544
|
-
def issuer_ref(self) -> Optional[pulumi.Input[
|
543
|
+
def issuer_ref(self) -> Optional[pulumi.Input[_builtins.str]]:
|
545
544
|
"""
|
546
545
|
Reference to an existing issuer.
|
547
546
|
"""
|
548
547
|
return pulumi.get(self, "issuer_ref")
|
549
548
|
|
550
549
|
@issuer_ref.setter
|
551
|
-
def issuer_ref(self, value: Optional[pulumi.Input[
|
550
|
+
def issuer_ref(self, value: Optional[pulumi.Input[_builtins.str]]):
|
552
551
|
pulumi.set(self, "issuer_ref", value)
|
553
552
|
|
554
|
-
@property
|
553
|
+
@_builtins.property
|
555
554
|
@pulumi.getter(name="issuingCertificates")
|
556
|
-
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
555
|
+
def issuing_certificates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
557
556
|
"""
|
558
557
|
Specifies the URL values for the Issuing
|
559
558
|
Certificate field.
|
@@ -561,12 +560,12 @@ class _SecretBackendIssuerState:
|
|
561
560
|
return pulumi.get(self, "issuing_certificates")
|
562
561
|
|
563
562
|
@issuing_certificates.setter
|
564
|
-
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
563
|
+
def issuing_certificates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
565
564
|
pulumi.set(self, "issuing_certificates", value)
|
566
565
|
|
567
|
-
@property
|
566
|
+
@_builtins.property
|
568
567
|
@pulumi.getter(name="leafNotAfterBehavior")
|
569
|
-
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[
|
568
|
+
def leaf_not_after_behavior(self) -> Optional[pulumi.Input[_builtins.str]]:
|
570
569
|
"""
|
571
570
|
Behavior of a leaf's NotAfter field during
|
572
571
|
issuance.
|
@@ -574,12 +573,12 @@ class _SecretBackendIssuerState:
|
|
574
573
|
return pulumi.get(self, "leaf_not_after_behavior")
|
575
574
|
|
576
575
|
@leaf_not_after_behavior.setter
|
577
|
-
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[
|
576
|
+
def leaf_not_after_behavior(self, value: Optional[pulumi.Input[_builtins.str]]):
|
578
577
|
pulumi.set(self, "leaf_not_after_behavior", value)
|
579
578
|
|
580
|
-
@property
|
579
|
+
@_builtins.property
|
581
580
|
@pulumi.getter(name="manualChains")
|
582
|
-
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
581
|
+
def manual_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
583
582
|
"""
|
584
583
|
Chain of issuer references to build this issuer's
|
585
584
|
computed CAChain field from, when non-empty.
|
@@ -587,12 +586,12 @@ class _SecretBackendIssuerState:
|
|
587
586
|
return pulumi.get(self, "manual_chains")
|
588
587
|
|
589
588
|
@manual_chains.setter
|
590
|
-
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
589
|
+
def manual_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
591
590
|
pulumi.set(self, "manual_chains", value)
|
592
591
|
|
593
|
-
@property
|
592
|
+
@_builtins.property
|
594
593
|
@pulumi.getter
|
595
|
-
def namespace(self) -> Optional[pulumi.Input[
|
594
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
596
595
|
"""
|
597
596
|
The namespace to provision the resource in.
|
598
597
|
The value should not contain leading or trailing forward slashes.
|
@@ -602,24 +601,24 @@ class _SecretBackendIssuerState:
|
|
602
601
|
return pulumi.get(self, "namespace")
|
603
602
|
|
604
603
|
@namespace.setter
|
605
|
-
def namespace(self, value: Optional[pulumi.Input[
|
604
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
606
605
|
pulumi.set(self, "namespace", value)
|
607
606
|
|
608
|
-
@property
|
607
|
+
@_builtins.property
|
609
608
|
@pulumi.getter(name="ocspServers")
|
610
|
-
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
609
|
+
def ocsp_servers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
611
610
|
"""
|
612
611
|
Specifies the URL values for the OCSP Servers field.
|
613
612
|
"""
|
614
613
|
return pulumi.get(self, "ocsp_servers")
|
615
614
|
|
616
615
|
@ocsp_servers.setter
|
617
|
-
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
616
|
+
def ocsp_servers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
618
617
|
pulumi.set(self, "ocsp_servers", value)
|
619
618
|
|
620
|
-
@property
|
619
|
+
@_builtins.property
|
621
620
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
622
|
-
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[
|
621
|
+
def revocation_signature_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
623
622
|
"""
|
624
623
|
Which signature algorithm to use
|
625
624
|
when building CRLs.
|
@@ -627,19 +626,19 @@ class _SecretBackendIssuerState:
|
|
627
626
|
return pulumi.get(self, "revocation_signature_algorithm")
|
628
627
|
|
629
628
|
@revocation_signature_algorithm.setter
|
630
|
-
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[
|
629
|
+
def revocation_signature_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
631
630
|
pulumi.set(self, "revocation_signature_algorithm", value)
|
632
631
|
|
633
|
-
@property
|
632
|
+
@_builtins.property
|
634
633
|
@pulumi.getter
|
635
|
-
def usage(self) -> Optional[pulumi.Input[
|
634
|
+
def usage(self) -> Optional[pulumi.Input[_builtins.str]]:
|
636
635
|
"""
|
637
636
|
Allowed usages for this issuer.
|
638
637
|
"""
|
639
638
|
return pulumi.get(self, "usage")
|
640
639
|
|
641
640
|
@usage.setter
|
642
|
-
def usage(self, value: Optional[pulumi.Input[
|
641
|
+
def usage(self, value: Optional[pulumi.Input[_builtins.str]]):
|
643
642
|
pulumi.set(self, "usage", value)
|
644
643
|
|
645
644
|
|
@@ -649,22 +648,22 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
649
648
|
def __init__(__self__,
|
650
649
|
resource_name: str,
|
651
650
|
opts: Optional[pulumi.ResourceOptions] = None,
|
652
|
-
backend: Optional[pulumi.Input[
|
653
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
654
|
-
disable_critical_extension_checks: Optional[pulumi.Input[
|
655
|
-
disable_name_checks: Optional[pulumi.Input[
|
656
|
-
disable_name_constraint_checks: Optional[pulumi.Input[
|
657
|
-
disable_path_length_checks: Optional[pulumi.Input[
|
658
|
-
enable_aia_url_templating: Optional[pulumi.Input[
|
659
|
-
issuer_name: Optional[pulumi.Input[
|
660
|
-
issuer_ref: Optional[pulumi.Input[
|
661
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
662
|
-
leaf_not_after_behavior: Optional[pulumi.Input[
|
663
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[
|
664
|
-
namespace: Optional[pulumi.Input[
|
665
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
666
|
-
revocation_signature_algorithm: Optional[pulumi.Input[
|
667
|
-
usage: Optional[pulumi.Input[
|
651
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
652
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
653
|
+
disable_critical_extension_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
654
|
+
disable_name_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
655
|
+
disable_name_constraint_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
656
|
+
disable_path_length_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
657
|
+
enable_aia_url_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
658
|
+
issuer_name: Optional[pulumi.Input[_builtins.str]] = None,
|
659
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
660
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
661
|
+
leaf_not_after_behavior: Optional[pulumi.Input[_builtins.str]] = None,
|
662
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
663
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
664
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
665
|
+
revocation_signature_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
666
|
+
usage: Optional[pulumi.Input[_builtins.str]] = None,
|
668
667
|
__props__=None):
|
669
668
|
"""
|
670
669
|
## Example Usage
|
@@ -678,12 +677,12 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
678
677
|
type="pki",
|
679
678
|
default_lease_ttl_seconds=3600,
|
680
679
|
max_lease_ttl_seconds=86400)
|
681
|
-
root = vault.
|
680
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
682
681
|
backend=pki.path,
|
683
682
|
type="internal",
|
684
683
|
common_name="test",
|
685
684
|
ttl="86400")
|
686
|
-
example = vault.
|
685
|
+
example = vault.pkisecret.SecretBackendIssuer("example",
|
687
686
|
backend=root.backend,
|
688
687
|
issuer_ref=root.issuer_id,
|
689
688
|
issuer_name="example-issuer")
|
@@ -699,43 +698,43 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
699
698
|
|
700
699
|
:param str resource_name: The name of the resource.
|
701
700
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
702
|
-
:param pulumi.Input[
|
701
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
703
702
|
leading or trailing `/`s.
|
704
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
703
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
705
704
|
Distribution Points field.
|
706
|
-
:param pulumi.Input[
|
705
|
+
:param pulumi.Input[_builtins.bool] disable_critical_extension_checks: This determines whether this
|
707
706
|
issuer is able to issue certificates where the chain of trust (including the
|
708
707
|
issued certificate) contain critical extensions not processed by Vault.
|
709
|
-
:param pulumi.Input[
|
708
|
+
:param pulumi.Input[_builtins.bool] disable_name_checks: This determines whether this issuer is able
|
710
709
|
to issue certificates where the chain of trust (including the final issued
|
711
710
|
certificate) contains a link in which the subject of the issuing certificate
|
712
711
|
does not match the named issuer of the certificate it signed.
|
713
|
-
:param pulumi.Input[
|
712
|
+
:param pulumi.Input[_builtins.bool] disable_name_constraint_checks: This determines whether this
|
714
713
|
issuer is able to issue certificates where the chain of trust (including the
|
715
714
|
final issued certificate) violates the name constraints critical extension of
|
716
715
|
one of the issuer certificates in the chain.
|
717
|
-
:param pulumi.Input[
|
716
|
+
:param pulumi.Input[_builtins.bool] disable_path_length_checks: This determines whether this issuer
|
718
717
|
is able to issue certificates where the chain of trust (including the final
|
719
718
|
issued certificate) is longer than allowed by a certificate authority in that
|
720
719
|
chain.
|
721
|
-
:param pulumi.Input[
|
720
|
+
:param pulumi.Input[_builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
722
721
|
be templated.
|
723
|
-
:param pulumi.Input[
|
724
|
-
:param pulumi.Input[
|
725
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
722
|
+
:param pulumi.Input[_builtins.str] issuer_name: Name of the issuer.
|
723
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Reference to an existing issuer.
|
724
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
726
725
|
Certificate field.
|
727
|
-
:param pulumi.Input[
|
726
|
+
:param pulumi.Input[_builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
728
727
|
issuance.
|
729
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
728
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
730
729
|
computed CAChain field from, when non-empty.
|
731
|
-
:param pulumi.Input[
|
730
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
732
731
|
The value should not contain leading or trailing forward slashes.
|
733
732
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
734
733
|
*Available only for Vault Enterprise*.
|
735
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
736
|
-
:param pulumi.Input[
|
734
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
735
|
+
:param pulumi.Input[_builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
737
736
|
when building CRLs.
|
738
|
-
:param pulumi.Input[
|
737
|
+
:param pulumi.Input[_builtins.str] usage: Allowed usages for this issuer.
|
739
738
|
"""
|
740
739
|
...
|
741
740
|
@overload
|
@@ -755,12 +754,12 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
755
754
|
type="pki",
|
756
755
|
default_lease_ttl_seconds=3600,
|
757
756
|
max_lease_ttl_seconds=86400)
|
758
|
-
root = vault.
|
757
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
759
758
|
backend=pki.path,
|
760
759
|
type="internal",
|
761
760
|
common_name="test",
|
762
761
|
ttl="86400")
|
763
|
-
example = vault.
|
762
|
+
example = vault.pkisecret.SecretBackendIssuer("example",
|
764
763
|
backend=root.backend,
|
765
764
|
issuer_ref=root.issuer_id,
|
766
765
|
issuer_name="example-issuer")
|
@@ -789,22 +788,22 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
789
788
|
def _internal_init(__self__,
|
790
789
|
resource_name: str,
|
791
790
|
opts: Optional[pulumi.ResourceOptions] = None,
|
792
|
-
backend: Optional[pulumi.Input[
|
793
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
794
|
-
disable_critical_extension_checks: Optional[pulumi.Input[
|
795
|
-
disable_name_checks: Optional[pulumi.Input[
|
796
|
-
disable_name_constraint_checks: Optional[pulumi.Input[
|
797
|
-
disable_path_length_checks: Optional[pulumi.Input[
|
798
|
-
enable_aia_url_templating: Optional[pulumi.Input[
|
799
|
-
issuer_name: Optional[pulumi.Input[
|
800
|
-
issuer_ref: Optional[pulumi.Input[
|
801
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
802
|
-
leaf_not_after_behavior: Optional[pulumi.Input[
|
803
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[
|
804
|
-
namespace: Optional[pulumi.Input[
|
805
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
806
|
-
revocation_signature_algorithm: Optional[pulumi.Input[
|
807
|
-
usage: Optional[pulumi.Input[
|
791
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
792
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
793
|
+
disable_critical_extension_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
794
|
+
disable_name_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
795
|
+
disable_name_constraint_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
796
|
+
disable_path_length_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
797
|
+
enable_aia_url_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
798
|
+
issuer_name: Optional[pulumi.Input[_builtins.str]] = None,
|
799
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
800
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
801
|
+
leaf_not_after_behavior: Optional[pulumi.Input[_builtins.str]] = None,
|
802
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
803
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
804
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
805
|
+
revocation_signature_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
806
|
+
usage: Optional[pulumi.Input[_builtins.str]] = None,
|
808
807
|
__props__=None):
|
809
808
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
810
809
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -845,23 +844,23 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
845
844
|
def get(resource_name: str,
|
846
845
|
id: pulumi.Input[str],
|
847
846
|
opts: Optional[pulumi.ResourceOptions] = None,
|
848
|
-
backend: Optional[pulumi.Input[
|
849
|
-
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[
|
850
|
-
disable_critical_extension_checks: Optional[pulumi.Input[
|
851
|
-
disable_name_checks: Optional[pulumi.Input[
|
852
|
-
disable_name_constraint_checks: Optional[pulumi.Input[
|
853
|
-
disable_path_length_checks: Optional[pulumi.Input[
|
854
|
-
enable_aia_url_templating: Optional[pulumi.Input[
|
855
|
-
issuer_id: Optional[pulumi.Input[
|
856
|
-
issuer_name: Optional[pulumi.Input[
|
857
|
-
issuer_ref: Optional[pulumi.Input[
|
858
|
-
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[
|
859
|
-
leaf_not_after_behavior: Optional[pulumi.Input[
|
860
|
-
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[
|
861
|
-
namespace: Optional[pulumi.Input[
|
862
|
-
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
863
|
-
revocation_signature_algorithm: Optional[pulumi.Input[
|
864
|
-
usage: Optional[pulumi.Input[
|
847
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
848
|
+
crl_distribution_points: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
849
|
+
disable_critical_extension_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
850
|
+
disable_name_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
851
|
+
disable_name_constraint_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
852
|
+
disable_path_length_checks: Optional[pulumi.Input[_builtins.bool]] = None,
|
853
|
+
enable_aia_url_templating: Optional[pulumi.Input[_builtins.bool]] = None,
|
854
|
+
issuer_id: Optional[pulumi.Input[_builtins.str]] = None,
|
855
|
+
issuer_name: Optional[pulumi.Input[_builtins.str]] = None,
|
856
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
857
|
+
issuing_certificates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
858
|
+
leaf_not_after_behavior: Optional[pulumi.Input[_builtins.str]] = None,
|
859
|
+
manual_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
860
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
861
|
+
ocsp_servers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
862
|
+
revocation_signature_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
863
|
+
usage: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendIssuer':
|
865
864
|
"""
|
866
865
|
Get an existing SecretBackendIssuer resource's state with the given name, id, and optional extra
|
867
866
|
properties used to qualify the lookup.
|
@@ -869,44 +868,44 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
869
868
|
:param str resource_name: The unique name of the resulting resource.
|
870
869
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
871
870
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
872
|
-
:param pulumi.Input[
|
871
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no
|
873
872
|
leading or trailing `/`s.
|
874
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
873
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] crl_distribution_points: Specifies the URL values for the CRL
|
875
874
|
Distribution Points field.
|
876
|
-
:param pulumi.Input[
|
875
|
+
:param pulumi.Input[_builtins.bool] disable_critical_extension_checks: This determines whether this
|
877
876
|
issuer is able to issue certificates where the chain of trust (including the
|
878
877
|
issued certificate) contain critical extensions not processed by Vault.
|
879
|
-
:param pulumi.Input[
|
878
|
+
:param pulumi.Input[_builtins.bool] disable_name_checks: This determines whether this issuer is able
|
880
879
|
to issue certificates where the chain of trust (including the final issued
|
881
880
|
certificate) contains a link in which the subject of the issuing certificate
|
882
881
|
does not match the named issuer of the certificate it signed.
|
883
|
-
:param pulumi.Input[
|
882
|
+
:param pulumi.Input[_builtins.bool] disable_name_constraint_checks: This determines whether this
|
884
883
|
issuer is able to issue certificates where the chain of trust (including the
|
885
884
|
final issued certificate) violates the name constraints critical extension of
|
886
885
|
one of the issuer certificates in the chain.
|
887
|
-
:param pulumi.Input[
|
886
|
+
:param pulumi.Input[_builtins.bool] disable_path_length_checks: This determines whether this issuer
|
888
887
|
is able to issue certificates where the chain of trust (including the final
|
889
888
|
issued certificate) is longer than allowed by a certificate authority in that
|
890
889
|
chain.
|
891
|
-
:param pulumi.Input[
|
890
|
+
:param pulumi.Input[_builtins.bool] enable_aia_url_templating: Specifies that the AIA URL values should
|
892
891
|
be templated.
|
893
|
-
:param pulumi.Input[
|
894
|
-
:param pulumi.Input[
|
895
|
-
:param pulumi.Input[
|
896
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
892
|
+
:param pulumi.Input[_builtins.str] issuer_id: ID of the issuer.
|
893
|
+
:param pulumi.Input[_builtins.str] issuer_name: Name of the issuer.
|
894
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Reference to an existing issuer.
|
895
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] issuing_certificates: Specifies the URL values for the Issuing
|
897
896
|
Certificate field.
|
898
|
-
:param pulumi.Input[
|
897
|
+
:param pulumi.Input[_builtins.str] leaf_not_after_behavior: Behavior of a leaf's NotAfter field during
|
899
898
|
issuance.
|
900
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
899
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] manual_chains: Chain of issuer references to build this issuer's
|
901
900
|
computed CAChain field from, when non-empty.
|
902
|
-
:param pulumi.Input[
|
901
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
903
902
|
The value should not contain leading or trailing forward slashes.
|
904
903
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
905
904
|
*Available only for Vault Enterprise*.
|
906
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
907
|
-
:param pulumi.Input[
|
905
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
|
906
|
+
:param pulumi.Input[_builtins.str] revocation_signature_algorithm: Which signature algorithm to use
|
908
907
|
when building CRLs.
|
909
|
-
:param pulumi.Input[
|
908
|
+
:param pulumi.Input[_builtins.str] usage: Allowed usages for this issuer.
|
910
909
|
"""
|
911
910
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
912
911
|
|
@@ -931,27 +930,27 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
931
930
|
__props__.__dict__["usage"] = usage
|
932
931
|
return SecretBackendIssuer(resource_name, opts=opts, __props__=__props__)
|
933
932
|
|
934
|
-
@property
|
933
|
+
@_builtins.property
|
935
934
|
@pulumi.getter
|
936
|
-
def backend(self) -> pulumi.Output[
|
935
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
937
936
|
"""
|
938
937
|
The path the PKI secret backend is mounted at, with no
|
939
938
|
leading or trailing `/`s.
|
940
939
|
"""
|
941
940
|
return pulumi.get(self, "backend")
|
942
941
|
|
943
|
-
@property
|
942
|
+
@_builtins.property
|
944
943
|
@pulumi.getter(name="crlDistributionPoints")
|
945
|
-
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[
|
944
|
+
def crl_distribution_points(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
946
945
|
"""
|
947
946
|
Specifies the URL values for the CRL
|
948
947
|
Distribution Points field.
|
949
948
|
"""
|
950
949
|
return pulumi.get(self, "crl_distribution_points")
|
951
950
|
|
952
|
-
@property
|
951
|
+
@_builtins.property
|
953
952
|
@pulumi.getter(name="disableCriticalExtensionChecks")
|
954
|
-
def disable_critical_extension_checks(self) -> pulumi.Output[Optional[
|
953
|
+
def disable_critical_extension_checks(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
955
954
|
"""
|
956
955
|
This determines whether this
|
957
956
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -959,9 +958,9 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
959
958
|
"""
|
960
959
|
return pulumi.get(self, "disable_critical_extension_checks")
|
961
960
|
|
962
|
-
@property
|
961
|
+
@_builtins.property
|
963
962
|
@pulumi.getter(name="disableNameChecks")
|
964
|
-
def disable_name_checks(self) -> pulumi.Output[Optional[
|
963
|
+
def disable_name_checks(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
965
964
|
"""
|
966
965
|
This determines whether this issuer is able
|
967
966
|
to issue certificates where the chain of trust (including the final issued
|
@@ -970,9 +969,9 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
970
969
|
"""
|
971
970
|
return pulumi.get(self, "disable_name_checks")
|
972
971
|
|
973
|
-
@property
|
972
|
+
@_builtins.property
|
974
973
|
@pulumi.getter(name="disableNameConstraintChecks")
|
975
|
-
def disable_name_constraint_checks(self) -> pulumi.Output[Optional[
|
974
|
+
def disable_name_constraint_checks(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
976
975
|
"""
|
977
976
|
This determines whether this
|
978
977
|
issuer is able to issue certificates where the chain of trust (including the
|
@@ -981,9 +980,9 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
981
980
|
"""
|
982
981
|
return pulumi.get(self, "disable_name_constraint_checks")
|
983
982
|
|
984
|
-
@property
|
983
|
+
@_builtins.property
|
985
984
|
@pulumi.getter(name="disablePathLengthChecks")
|
986
|
-
def disable_path_length_checks(self) -> pulumi.Output[Optional[
|
985
|
+
def disable_path_length_checks(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
987
986
|
"""
|
988
987
|
This determines whether this issuer
|
989
988
|
is able to issue certificates where the chain of trust (including the final
|
@@ -992,69 +991,69 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
992
991
|
"""
|
993
992
|
return pulumi.get(self, "disable_path_length_checks")
|
994
993
|
|
995
|
-
@property
|
994
|
+
@_builtins.property
|
996
995
|
@pulumi.getter(name="enableAiaUrlTemplating")
|
997
|
-
def enable_aia_url_templating(self) -> pulumi.Output[Optional[
|
996
|
+
def enable_aia_url_templating(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
998
997
|
"""
|
999
998
|
Specifies that the AIA URL values should
|
1000
999
|
be templated.
|
1001
1000
|
"""
|
1002
1001
|
return pulumi.get(self, "enable_aia_url_templating")
|
1003
1002
|
|
1004
|
-
@property
|
1003
|
+
@_builtins.property
|
1005
1004
|
@pulumi.getter(name="issuerId")
|
1006
|
-
def issuer_id(self) -> pulumi.Output[
|
1005
|
+
def issuer_id(self) -> pulumi.Output[_builtins.str]:
|
1007
1006
|
"""
|
1008
1007
|
ID of the issuer.
|
1009
1008
|
"""
|
1010
1009
|
return pulumi.get(self, "issuer_id")
|
1011
1010
|
|
1012
|
-
@property
|
1011
|
+
@_builtins.property
|
1013
1012
|
@pulumi.getter(name="issuerName")
|
1014
|
-
def issuer_name(self) -> pulumi.Output[Optional[
|
1013
|
+
def issuer_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1015
1014
|
"""
|
1016
1015
|
Name of the issuer.
|
1017
1016
|
"""
|
1018
1017
|
return pulumi.get(self, "issuer_name")
|
1019
1018
|
|
1020
|
-
@property
|
1019
|
+
@_builtins.property
|
1021
1020
|
@pulumi.getter(name="issuerRef")
|
1022
|
-
def issuer_ref(self) -> pulumi.Output[
|
1021
|
+
def issuer_ref(self) -> pulumi.Output[_builtins.str]:
|
1023
1022
|
"""
|
1024
1023
|
Reference to an existing issuer.
|
1025
1024
|
"""
|
1026
1025
|
return pulumi.get(self, "issuer_ref")
|
1027
1026
|
|
1028
|
-
@property
|
1027
|
+
@_builtins.property
|
1029
1028
|
@pulumi.getter(name="issuingCertificates")
|
1030
|
-
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[
|
1029
|
+
def issuing_certificates(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1031
1030
|
"""
|
1032
1031
|
Specifies the URL values for the Issuing
|
1033
1032
|
Certificate field.
|
1034
1033
|
"""
|
1035
1034
|
return pulumi.get(self, "issuing_certificates")
|
1036
1035
|
|
1037
|
-
@property
|
1036
|
+
@_builtins.property
|
1038
1037
|
@pulumi.getter(name="leafNotAfterBehavior")
|
1039
|
-
def leaf_not_after_behavior(self) -> pulumi.Output[
|
1038
|
+
def leaf_not_after_behavior(self) -> pulumi.Output[_builtins.str]:
|
1040
1039
|
"""
|
1041
1040
|
Behavior of a leaf's NotAfter field during
|
1042
1041
|
issuance.
|
1043
1042
|
"""
|
1044
1043
|
return pulumi.get(self, "leaf_not_after_behavior")
|
1045
1044
|
|
1046
|
-
@property
|
1045
|
+
@_builtins.property
|
1047
1046
|
@pulumi.getter(name="manualChains")
|
1048
|
-
def manual_chains(self) -> pulumi.Output[Optional[Sequence[
|
1047
|
+
def manual_chains(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1049
1048
|
"""
|
1050
1049
|
Chain of issuer references to build this issuer's
|
1051
1050
|
computed CAChain field from, when non-empty.
|
1052
1051
|
"""
|
1053
1052
|
return pulumi.get(self, "manual_chains")
|
1054
1053
|
|
1055
|
-
@property
|
1054
|
+
@_builtins.property
|
1056
1055
|
@pulumi.getter
|
1057
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1056
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1058
1057
|
"""
|
1059
1058
|
The namespace to provision the resource in.
|
1060
1059
|
The value should not contain leading or trailing forward slashes.
|
@@ -1063,26 +1062,26 @@ class SecretBackendIssuer(pulumi.CustomResource):
|
|
1063
1062
|
"""
|
1064
1063
|
return pulumi.get(self, "namespace")
|
1065
1064
|
|
1066
|
-
@property
|
1065
|
+
@_builtins.property
|
1067
1066
|
@pulumi.getter(name="ocspServers")
|
1068
|
-
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[
|
1067
|
+
def ocsp_servers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1069
1068
|
"""
|
1070
1069
|
Specifies the URL values for the OCSP Servers field.
|
1071
1070
|
"""
|
1072
1071
|
return pulumi.get(self, "ocsp_servers")
|
1073
1072
|
|
1074
|
-
@property
|
1073
|
+
@_builtins.property
|
1075
1074
|
@pulumi.getter(name="revocationSignatureAlgorithm")
|
1076
|
-
def revocation_signature_algorithm(self) -> pulumi.Output[
|
1075
|
+
def revocation_signature_algorithm(self) -> pulumi.Output[_builtins.str]:
|
1077
1076
|
"""
|
1078
1077
|
Which signature algorithm to use
|
1079
1078
|
when building CRLs.
|
1080
1079
|
"""
|
1081
1080
|
return pulumi.get(self, "revocation_signature_algorithm")
|
1082
1081
|
|
1083
|
-
@property
|
1082
|
+
@_builtins.property
|
1084
1083
|
@pulumi.getter
|
1085
|
-
def usage(self) -> pulumi.Output[
|
1084
|
+
def usage(self) -> pulumi.Output[_builtins.str]:
|
1086
1085
|
"""
|
1087
1086
|
Allowed usages for this issuer.
|
1088
1087
|
"""
|