pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1370 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['BackendConfigAutoTidyArgs', 'BackendConfigAutoTidy']
18
+
19
+ @pulumi.input_type
20
+ class BackendConfigAutoTidyArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ enabled: pulumi.Input[_builtins.bool],
24
+ acme_account_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
25
+ interval_duration: Optional[pulumi.Input[_builtins.str]] = None,
26
+ issuer_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
27
+ maintain_stored_certificate_counts: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ max_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
29
+ min_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
31
+ pause_duration: Optional[pulumi.Input[_builtins.str]] = None,
32
+ publish_stored_certificate_count_metrics: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ revocation_queue_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
34
+ safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
35
+ tidy_acme: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ tidy_cert_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ tidy_cert_store: Optional[pulumi.Input[_builtins.bool]] = None,
38
+ tidy_cmpv2_nonce_store: Optional[pulumi.Input[_builtins.bool]] = None,
39
+ tidy_cross_cluster_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
40
+ tidy_expired_issuers: Optional[pulumi.Input[_builtins.bool]] = None,
41
+ tidy_move_legacy_ca_bundle: Optional[pulumi.Input[_builtins.bool]] = None,
42
+ tidy_revocation_queue: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ tidy_revoked_cert_issuer_associations: Optional[pulumi.Input[_builtins.bool]] = None,
44
+ tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None):
45
+ """
46
+ The set of arguments for constructing a BackendConfigAutoTidy resource.
47
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
48
+ read the configuration from, with no leading or trailing `/`s.
49
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
50
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
51
+ :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
52
+ between tidy invocations (after one finishes to the start of the next).
53
+ :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
54
+ expiration before it is removed from the backend storage.
55
+ :param pulumi.Input[_builtins.bool] maintain_stored_certificate_counts: This configures whether stored certificate are
56
+ counted upon initialization of the backend, and whether during normal operation, a running count
57
+ of certificates stored is maintained.
58
+ :param pulumi.Input[_builtins.str] max_startup_backoff_duration: The maximum amount of time auto-tidy will be delayed
59
+ after startup.
60
+ :param pulumi.Input[_builtins.str] min_startup_backoff_duration: The minimum amount of time auto-tidy will be delayed
61
+ after startup.
62
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
63
+ The value should not contain leading or trailing forward slashes.
64
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
+ *Available only for Vault Enterprise*.
66
+ :param pulumi.Input[_builtins.str] pause_duration: The amount of time to wait between processing certificates.
67
+ :param pulumi.Input[_builtins.bool] publish_stored_certificate_count_metrics: This configures whether the stored
68
+ certificate count is published to the metrics consumer.
69
+ :param pulumi.Input[_builtins.str] revocation_queue_safety_buffer: The amount of time that must pass from the
70
+ cross-cluster revocation request being initiated to when it will be slated for removal.
71
+ :param pulumi.Input[_builtins.str] safety_buffer: The amount of extra time that must have passed beyond certificate
72
+ expiration before it is removed from the backend storage and/or revocation list.
73
+ :param pulumi.Input[_builtins.bool] tidy_acme: Set to true to enable tidying ACME accounts, orders and authorizations.
74
+ :param pulumi.Input[_builtins.bool] tidy_cert_metadata: Set to true to enable tidying up certificate metadata.
75
+ :param pulumi.Input[_builtins.bool] tidy_cert_store: Set to true to enable tidying up the certificate store
76
+ :param pulumi.Input[_builtins.bool] tidy_cmpv2_nonce_store: Set to true to enable tidying up the CMPv2 nonce store.
77
+ :param pulumi.Input[_builtins.bool] tidy_cross_cluster_revoked_certs: Set to true to enable tidying up the cross-cluster
78
+ revoked certificate store.
79
+ :param pulumi.Input[_builtins.bool] tidy_expired_issuers: Set to true to automatically remove expired issuers past the
80
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
81
+ :param pulumi.Input[_builtins.bool] tidy_move_legacy_ca_bundle: Set to true to move the legacy `ca_bundle` from
82
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
83
+ :param pulumi.Input[_builtins.bool] tidy_revocation_queue: Set to true to remove stale revocation queue entries that
84
+ haven't been confirmed by any active cluster.
85
+ :param pulumi.Input[_builtins.bool] tidy_revoked_cert_issuer_associations: Set to true to validate issuer associations
86
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
87
+ :param pulumi.Input[_builtins.bool] tidy_revoked_certs: Set to true to remove all invalid and expired certificates from
88
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
89
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
90
+ the CRL, and the CRL will be rotated.
91
+ """
92
+ pulumi.set(__self__, "backend", backend)
93
+ pulumi.set(__self__, "enabled", enabled)
94
+ if acme_account_safety_buffer is not None:
95
+ pulumi.set(__self__, "acme_account_safety_buffer", acme_account_safety_buffer)
96
+ if interval_duration is not None:
97
+ pulumi.set(__self__, "interval_duration", interval_duration)
98
+ if issuer_safety_buffer is not None:
99
+ pulumi.set(__self__, "issuer_safety_buffer", issuer_safety_buffer)
100
+ if maintain_stored_certificate_counts is not None:
101
+ pulumi.set(__self__, "maintain_stored_certificate_counts", maintain_stored_certificate_counts)
102
+ if max_startup_backoff_duration is not None:
103
+ pulumi.set(__self__, "max_startup_backoff_duration", max_startup_backoff_duration)
104
+ if min_startup_backoff_duration is not None:
105
+ pulumi.set(__self__, "min_startup_backoff_duration", min_startup_backoff_duration)
106
+ if namespace is not None:
107
+ pulumi.set(__self__, "namespace", namespace)
108
+ if pause_duration is not None:
109
+ pulumi.set(__self__, "pause_duration", pause_duration)
110
+ if publish_stored_certificate_count_metrics is not None:
111
+ pulumi.set(__self__, "publish_stored_certificate_count_metrics", publish_stored_certificate_count_metrics)
112
+ if revocation_queue_safety_buffer is not None:
113
+ pulumi.set(__self__, "revocation_queue_safety_buffer", revocation_queue_safety_buffer)
114
+ if safety_buffer is not None:
115
+ pulumi.set(__self__, "safety_buffer", safety_buffer)
116
+ if tidy_acme is not None:
117
+ pulumi.set(__self__, "tidy_acme", tidy_acme)
118
+ if tidy_cert_metadata is not None:
119
+ pulumi.set(__self__, "tidy_cert_metadata", tidy_cert_metadata)
120
+ if tidy_cert_store is not None:
121
+ pulumi.set(__self__, "tidy_cert_store", tidy_cert_store)
122
+ if tidy_cmpv2_nonce_store is not None:
123
+ pulumi.set(__self__, "tidy_cmpv2_nonce_store", tidy_cmpv2_nonce_store)
124
+ if tidy_cross_cluster_revoked_certs is not None:
125
+ pulumi.set(__self__, "tidy_cross_cluster_revoked_certs", tidy_cross_cluster_revoked_certs)
126
+ if tidy_expired_issuers is not None:
127
+ pulumi.set(__self__, "tidy_expired_issuers", tidy_expired_issuers)
128
+ if tidy_move_legacy_ca_bundle is not None:
129
+ pulumi.set(__self__, "tidy_move_legacy_ca_bundle", tidy_move_legacy_ca_bundle)
130
+ if tidy_revocation_queue is not None:
131
+ pulumi.set(__self__, "tidy_revocation_queue", tidy_revocation_queue)
132
+ if tidy_revoked_cert_issuer_associations is not None:
133
+ pulumi.set(__self__, "tidy_revoked_cert_issuer_associations", tidy_revoked_cert_issuer_associations)
134
+ if tidy_revoked_certs is not None:
135
+ pulumi.set(__self__, "tidy_revoked_certs", tidy_revoked_certs)
136
+
137
+ @_builtins.property
138
+ @pulumi.getter
139
+ def backend(self) -> pulumi.Input[_builtins.str]:
140
+ """
141
+ The path to the PKI secret backend to
142
+ read the configuration from, with no leading or trailing `/`s.
143
+ """
144
+ return pulumi.get(self, "backend")
145
+
146
+ @backend.setter
147
+ def backend(self, value: pulumi.Input[_builtins.str]):
148
+ pulumi.set(self, "backend", value)
149
+
150
+ @_builtins.property
151
+ @pulumi.getter
152
+ def enabled(self) -> pulumi.Input[_builtins.bool]:
153
+ """
154
+ Specifies whether automatic tidy is enabled or not.
155
+ """
156
+ return pulumi.get(self, "enabled")
157
+
158
+ @enabled.setter
159
+ def enabled(self, value: pulumi.Input[_builtins.bool]):
160
+ pulumi.set(self, "enabled", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter(name="acmeAccountSafetyBuffer")
164
+ def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
167
+ """
168
+ return pulumi.get(self, "acme_account_safety_buffer")
169
+
170
+ @acme_account_safety_buffer.setter
171
+ def acme_account_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "acme_account_safety_buffer", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter(name="intervalDuration")
176
+ def interval_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
177
+ """
178
+ Interval at which to run an auto-tidy operation. This is the time
179
+ between tidy invocations (after one finishes to the start of the next).
180
+ """
181
+ return pulumi.get(self, "interval_duration")
182
+
183
+ @interval_duration.setter
184
+ def interval_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
185
+ pulumi.set(self, "interval_duration", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter(name="issuerSafetyBuffer")
189
+ def issuer_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
190
+ """
191
+ The amount of extra time that must have passed beyond issuer's
192
+ expiration before it is removed from the backend storage.
193
+ """
194
+ return pulumi.get(self, "issuer_safety_buffer")
195
+
196
+ @issuer_safety_buffer.setter
197
+ def issuer_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
198
+ pulumi.set(self, "issuer_safety_buffer", value)
199
+
200
+ @_builtins.property
201
+ @pulumi.getter(name="maintainStoredCertificateCounts")
202
+ def maintain_stored_certificate_counts(self) -> Optional[pulumi.Input[_builtins.bool]]:
203
+ """
204
+ This configures whether stored certificate are
205
+ counted upon initialization of the backend, and whether during normal operation, a running count
206
+ of certificates stored is maintained.
207
+ """
208
+ return pulumi.get(self, "maintain_stored_certificate_counts")
209
+
210
+ @maintain_stored_certificate_counts.setter
211
+ def maintain_stored_certificate_counts(self, value: Optional[pulumi.Input[_builtins.bool]]):
212
+ pulumi.set(self, "maintain_stored_certificate_counts", value)
213
+
214
+ @_builtins.property
215
+ @pulumi.getter(name="maxStartupBackoffDuration")
216
+ def max_startup_backoff_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
217
+ """
218
+ The maximum amount of time auto-tidy will be delayed
219
+ after startup.
220
+ """
221
+ return pulumi.get(self, "max_startup_backoff_duration")
222
+
223
+ @max_startup_backoff_duration.setter
224
+ def max_startup_backoff_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
225
+ pulumi.set(self, "max_startup_backoff_duration", value)
226
+
227
+ @_builtins.property
228
+ @pulumi.getter(name="minStartupBackoffDuration")
229
+ def min_startup_backoff_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
230
+ """
231
+ The minimum amount of time auto-tidy will be delayed
232
+ after startup.
233
+ """
234
+ return pulumi.get(self, "min_startup_backoff_duration")
235
+
236
+ @min_startup_backoff_duration.setter
237
+ def min_startup_backoff_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
238
+ pulumi.set(self, "min_startup_backoff_duration", value)
239
+
240
+ @_builtins.property
241
+ @pulumi.getter
242
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
243
+ """
244
+ The namespace of the target resource.
245
+ The value should not contain leading or trailing forward slashes.
246
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
247
+ *Available only for Vault Enterprise*.
248
+ """
249
+ return pulumi.get(self, "namespace")
250
+
251
+ @namespace.setter
252
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
253
+ pulumi.set(self, "namespace", value)
254
+
255
+ @_builtins.property
256
+ @pulumi.getter(name="pauseDuration")
257
+ def pause_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
258
+ """
259
+ The amount of time to wait between processing certificates.
260
+ """
261
+ return pulumi.get(self, "pause_duration")
262
+
263
+ @pause_duration.setter
264
+ def pause_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
265
+ pulumi.set(self, "pause_duration", value)
266
+
267
+ @_builtins.property
268
+ @pulumi.getter(name="publishStoredCertificateCountMetrics")
269
+ def publish_stored_certificate_count_metrics(self) -> Optional[pulumi.Input[_builtins.bool]]:
270
+ """
271
+ This configures whether the stored
272
+ certificate count is published to the metrics consumer.
273
+ """
274
+ return pulumi.get(self, "publish_stored_certificate_count_metrics")
275
+
276
+ @publish_stored_certificate_count_metrics.setter
277
+ def publish_stored_certificate_count_metrics(self, value: Optional[pulumi.Input[_builtins.bool]]):
278
+ pulumi.set(self, "publish_stored_certificate_count_metrics", value)
279
+
280
+ @_builtins.property
281
+ @pulumi.getter(name="revocationQueueSafetyBuffer")
282
+ def revocation_queue_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
283
+ """
284
+ The amount of time that must pass from the
285
+ cross-cluster revocation request being initiated to when it will be slated for removal.
286
+ """
287
+ return pulumi.get(self, "revocation_queue_safety_buffer")
288
+
289
+ @revocation_queue_safety_buffer.setter
290
+ def revocation_queue_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
291
+ pulumi.set(self, "revocation_queue_safety_buffer", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="safetyBuffer")
295
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
296
+ """
297
+ The amount of extra time that must have passed beyond certificate
298
+ expiration before it is removed from the backend storage and/or revocation list.
299
+ """
300
+ return pulumi.get(self, "safety_buffer")
301
+
302
+ @safety_buffer.setter
303
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
304
+ pulumi.set(self, "safety_buffer", value)
305
+
306
+ @_builtins.property
307
+ @pulumi.getter(name="tidyAcme")
308
+ def tidy_acme(self) -> Optional[pulumi.Input[_builtins.bool]]:
309
+ """
310
+ Set to true to enable tidying ACME accounts, orders and authorizations.
311
+ """
312
+ return pulumi.get(self, "tidy_acme")
313
+
314
+ @tidy_acme.setter
315
+ def tidy_acme(self, value: Optional[pulumi.Input[_builtins.bool]]):
316
+ pulumi.set(self, "tidy_acme", value)
317
+
318
+ @_builtins.property
319
+ @pulumi.getter(name="tidyCertMetadata")
320
+ def tidy_cert_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
321
+ """
322
+ Set to true to enable tidying up certificate metadata.
323
+ """
324
+ return pulumi.get(self, "tidy_cert_metadata")
325
+
326
+ @tidy_cert_metadata.setter
327
+ def tidy_cert_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
328
+ pulumi.set(self, "tidy_cert_metadata", value)
329
+
330
+ @_builtins.property
331
+ @pulumi.getter(name="tidyCertStore")
332
+ def tidy_cert_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
333
+ """
334
+ Set to true to enable tidying up the certificate store
335
+ """
336
+ return pulumi.get(self, "tidy_cert_store")
337
+
338
+ @tidy_cert_store.setter
339
+ def tidy_cert_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
340
+ pulumi.set(self, "tidy_cert_store", value)
341
+
342
+ @_builtins.property
343
+ @pulumi.getter(name="tidyCmpv2NonceStore")
344
+ def tidy_cmpv2_nonce_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
345
+ """
346
+ Set to true to enable tidying up the CMPv2 nonce store.
347
+ """
348
+ return pulumi.get(self, "tidy_cmpv2_nonce_store")
349
+
350
+ @tidy_cmpv2_nonce_store.setter
351
+ def tidy_cmpv2_nonce_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
352
+ pulumi.set(self, "tidy_cmpv2_nonce_store", value)
353
+
354
+ @_builtins.property
355
+ @pulumi.getter(name="tidyCrossClusterRevokedCerts")
356
+ def tidy_cross_cluster_revoked_certs(self) -> Optional[pulumi.Input[_builtins.bool]]:
357
+ """
358
+ Set to true to enable tidying up the cross-cluster
359
+ revoked certificate store.
360
+ """
361
+ return pulumi.get(self, "tidy_cross_cluster_revoked_certs")
362
+
363
+ @tidy_cross_cluster_revoked_certs.setter
364
+ def tidy_cross_cluster_revoked_certs(self, value: Optional[pulumi.Input[_builtins.bool]]):
365
+ pulumi.set(self, "tidy_cross_cluster_revoked_certs", value)
366
+
367
+ @_builtins.property
368
+ @pulumi.getter(name="tidyExpiredIssuers")
369
+ def tidy_expired_issuers(self) -> Optional[pulumi.Input[_builtins.bool]]:
370
+ """
371
+ Set to true to automatically remove expired issuers past the
372
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
373
+ """
374
+ return pulumi.get(self, "tidy_expired_issuers")
375
+
376
+ @tidy_expired_issuers.setter
377
+ def tidy_expired_issuers(self, value: Optional[pulumi.Input[_builtins.bool]]):
378
+ pulumi.set(self, "tidy_expired_issuers", value)
379
+
380
+ @_builtins.property
381
+ @pulumi.getter(name="tidyMoveLegacyCaBundle")
382
+ def tidy_move_legacy_ca_bundle(self) -> Optional[pulumi.Input[_builtins.bool]]:
383
+ """
384
+ Set to true to move the legacy `ca_bundle` from
385
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
386
+ """
387
+ return pulumi.get(self, "tidy_move_legacy_ca_bundle")
388
+
389
+ @tidy_move_legacy_ca_bundle.setter
390
+ def tidy_move_legacy_ca_bundle(self, value: Optional[pulumi.Input[_builtins.bool]]):
391
+ pulumi.set(self, "tidy_move_legacy_ca_bundle", value)
392
+
393
+ @_builtins.property
394
+ @pulumi.getter(name="tidyRevocationQueue")
395
+ def tidy_revocation_queue(self) -> Optional[pulumi.Input[_builtins.bool]]:
396
+ """
397
+ Set to true to remove stale revocation queue entries that
398
+ haven't been confirmed by any active cluster.
399
+ """
400
+ return pulumi.get(self, "tidy_revocation_queue")
401
+
402
+ @tidy_revocation_queue.setter
403
+ def tidy_revocation_queue(self, value: Optional[pulumi.Input[_builtins.bool]]):
404
+ pulumi.set(self, "tidy_revocation_queue", value)
405
+
406
+ @_builtins.property
407
+ @pulumi.getter(name="tidyRevokedCertIssuerAssociations")
408
+ def tidy_revoked_cert_issuer_associations(self) -> Optional[pulumi.Input[_builtins.bool]]:
409
+ """
410
+ Set to true to validate issuer associations
411
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
412
+ """
413
+ return pulumi.get(self, "tidy_revoked_cert_issuer_associations")
414
+
415
+ @tidy_revoked_cert_issuer_associations.setter
416
+ def tidy_revoked_cert_issuer_associations(self, value: Optional[pulumi.Input[_builtins.bool]]):
417
+ pulumi.set(self, "tidy_revoked_cert_issuer_associations", value)
418
+
419
+ @_builtins.property
420
+ @pulumi.getter(name="tidyRevokedCerts")
421
+ def tidy_revoked_certs(self) -> Optional[pulumi.Input[_builtins.bool]]:
422
+ """
423
+ Set to true to remove all invalid and expired certificates from
424
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
425
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
426
+ the CRL, and the CRL will be rotated.
427
+ """
428
+ return pulumi.get(self, "tidy_revoked_certs")
429
+
430
+ @tidy_revoked_certs.setter
431
+ def tidy_revoked_certs(self, value: Optional[pulumi.Input[_builtins.bool]]):
432
+ pulumi.set(self, "tidy_revoked_certs", value)
433
+
434
+
435
+ @pulumi.input_type
436
+ class _BackendConfigAutoTidyState:
437
+ def __init__(__self__, *,
438
+ acme_account_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
439
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
440
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
441
+ interval_duration: Optional[pulumi.Input[_builtins.str]] = None,
442
+ issuer_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
443
+ maintain_stored_certificate_counts: Optional[pulumi.Input[_builtins.bool]] = None,
444
+ max_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
445
+ min_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
446
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
447
+ pause_duration: Optional[pulumi.Input[_builtins.str]] = None,
448
+ publish_stored_certificate_count_metrics: Optional[pulumi.Input[_builtins.bool]] = None,
449
+ revocation_queue_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
450
+ safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
451
+ tidy_acme: Optional[pulumi.Input[_builtins.bool]] = None,
452
+ tidy_cert_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
453
+ tidy_cert_store: Optional[pulumi.Input[_builtins.bool]] = None,
454
+ tidy_cmpv2_nonce_store: Optional[pulumi.Input[_builtins.bool]] = None,
455
+ tidy_cross_cluster_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
456
+ tidy_expired_issuers: Optional[pulumi.Input[_builtins.bool]] = None,
457
+ tidy_move_legacy_ca_bundle: Optional[pulumi.Input[_builtins.bool]] = None,
458
+ tidy_revocation_queue: Optional[pulumi.Input[_builtins.bool]] = None,
459
+ tidy_revoked_cert_issuer_associations: Optional[pulumi.Input[_builtins.bool]] = None,
460
+ tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None):
461
+ """
462
+ Input properties used for looking up and filtering BackendConfigAutoTidy resources.
463
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
464
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
465
+ read the configuration from, with no leading or trailing `/`s.
466
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
467
+ :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
468
+ between tidy invocations (after one finishes to the start of the next).
469
+ :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
470
+ expiration before it is removed from the backend storage.
471
+ :param pulumi.Input[_builtins.bool] maintain_stored_certificate_counts: This configures whether stored certificate are
472
+ counted upon initialization of the backend, and whether during normal operation, a running count
473
+ of certificates stored is maintained.
474
+ :param pulumi.Input[_builtins.str] max_startup_backoff_duration: The maximum amount of time auto-tidy will be delayed
475
+ after startup.
476
+ :param pulumi.Input[_builtins.str] min_startup_backoff_duration: The minimum amount of time auto-tidy will be delayed
477
+ after startup.
478
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
479
+ The value should not contain leading or trailing forward slashes.
480
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
481
+ *Available only for Vault Enterprise*.
482
+ :param pulumi.Input[_builtins.str] pause_duration: The amount of time to wait between processing certificates.
483
+ :param pulumi.Input[_builtins.bool] publish_stored_certificate_count_metrics: This configures whether the stored
484
+ certificate count is published to the metrics consumer.
485
+ :param pulumi.Input[_builtins.str] revocation_queue_safety_buffer: The amount of time that must pass from the
486
+ cross-cluster revocation request being initiated to when it will be slated for removal.
487
+ :param pulumi.Input[_builtins.str] safety_buffer: The amount of extra time that must have passed beyond certificate
488
+ expiration before it is removed from the backend storage and/or revocation list.
489
+ :param pulumi.Input[_builtins.bool] tidy_acme: Set to true to enable tidying ACME accounts, orders and authorizations.
490
+ :param pulumi.Input[_builtins.bool] tidy_cert_metadata: Set to true to enable tidying up certificate metadata.
491
+ :param pulumi.Input[_builtins.bool] tidy_cert_store: Set to true to enable tidying up the certificate store
492
+ :param pulumi.Input[_builtins.bool] tidy_cmpv2_nonce_store: Set to true to enable tidying up the CMPv2 nonce store.
493
+ :param pulumi.Input[_builtins.bool] tidy_cross_cluster_revoked_certs: Set to true to enable tidying up the cross-cluster
494
+ revoked certificate store.
495
+ :param pulumi.Input[_builtins.bool] tidy_expired_issuers: Set to true to automatically remove expired issuers past the
496
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
497
+ :param pulumi.Input[_builtins.bool] tidy_move_legacy_ca_bundle: Set to true to move the legacy `ca_bundle` from
498
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
499
+ :param pulumi.Input[_builtins.bool] tidy_revocation_queue: Set to true to remove stale revocation queue entries that
500
+ haven't been confirmed by any active cluster.
501
+ :param pulumi.Input[_builtins.bool] tidy_revoked_cert_issuer_associations: Set to true to validate issuer associations
502
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
503
+ :param pulumi.Input[_builtins.bool] tidy_revoked_certs: Set to true to remove all invalid and expired certificates from
504
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
505
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
506
+ the CRL, and the CRL will be rotated.
507
+ """
508
+ if acme_account_safety_buffer is not None:
509
+ pulumi.set(__self__, "acme_account_safety_buffer", acme_account_safety_buffer)
510
+ if backend is not None:
511
+ pulumi.set(__self__, "backend", backend)
512
+ if enabled is not None:
513
+ pulumi.set(__self__, "enabled", enabled)
514
+ if interval_duration is not None:
515
+ pulumi.set(__self__, "interval_duration", interval_duration)
516
+ if issuer_safety_buffer is not None:
517
+ pulumi.set(__self__, "issuer_safety_buffer", issuer_safety_buffer)
518
+ if maintain_stored_certificate_counts is not None:
519
+ pulumi.set(__self__, "maintain_stored_certificate_counts", maintain_stored_certificate_counts)
520
+ if max_startup_backoff_duration is not None:
521
+ pulumi.set(__self__, "max_startup_backoff_duration", max_startup_backoff_duration)
522
+ if min_startup_backoff_duration is not None:
523
+ pulumi.set(__self__, "min_startup_backoff_duration", min_startup_backoff_duration)
524
+ if namespace is not None:
525
+ pulumi.set(__self__, "namespace", namespace)
526
+ if pause_duration is not None:
527
+ pulumi.set(__self__, "pause_duration", pause_duration)
528
+ if publish_stored_certificate_count_metrics is not None:
529
+ pulumi.set(__self__, "publish_stored_certificate_count_metrics", publish_stored_certificate_count_metrics)
530
+ if revocation_queue_safety_buffer is not None:
531
+ pulumi.set(__self__, "revocation_queue_safety_buffer", revocation_queue_safety_buffer)
532
+ if safety_buffer is not None:
533
+ pulumi.set(__self__, "safety_buffer", safety_buffer)
534
+ if tidy_acme is not None:
535
+ pulumi.set(__self__, "tidy_acme", tidy_acme)
536
+ if tidy_cert_metadata is not None:
537
+ pulumi.set(__self__, "tidy_cert_metadata", tidy_cert_metadata)
538
+ if tidy_cert_store is not None:
539
+ pulumi.set(__self__, "tidy_cert_store", tidy_cert_store)
540
+ if tidy_cmpv2_nonce_store is not None:
541
+ pulumi.set(__self__, "tidy_cmpv2_nonce_store", tidy_cmpv2_nonce_store)
542
+ if tidy_cross_cluster_revoked_certs is not None:
543
+ pulumi.set(__self__, "tidy_cross_cluster_revoked_certs", tidy_cross_cluster_revoked_certs)
544
+ if tidy_expired_issuers is not None:
545
+ pulumi.set(__self__, "tidy_expired_issuers", tidy_expired_issuers)
546
+ if tidy_move_legacy_ca_bundle is not None:
547
+ pulumi.set(__self__, "tidy_move_legacy_ca_bundle", tidy_move_legacy_ca_bundle)
548
+ if tidy_revocation_queue is not None:
549
+ pulumi.set(__self__, "tidy_revocation_queue", tidy_revocation_queue)
550
+ if tidy_revoked_cert_issuer_associations is not None:
551
+ pulumi.set(__self__, "tidy_revoked_cert_issuer_associations", tidy_revoked_cert_issuer_associations)
552
+ if tidy_revoked_certs is not None:
553
+ pulumi.set(__self__, "tidy_revoked_certs", tidy_revoked_certs)
554
+
555
+ @_builtins.property
556
+ @pulumi.getter(name="acmeAccountSafetyBuffer")
557
+ def acme_account_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
558
+ """
559
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
560
+ """
561
+ return pulumi.get(self, "acme_account_safety_buffer")
562
+
563
+ @acme_account_safety_buffer.setter
564
+ def acme_account_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
565
+ pulumi.set(self, "acme_account_safety_buffer", value)
566
+
567
+ @_builtins.property
568
+ @pulumi.getter
569
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
570
+ """
571
+ The path to the PKI secret backend to
572
+ read the configuration from, with no leading or trailing `/`s.
573
+ """
574
+ return pulumi.get(self, "backend")
575
+
576
+ @backend.setter
577
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
578
+ pulumi.set(self, "backend", value)
579
+
580
+ @_builtins.property
581
+ @pulumi.getter
582
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
583
+ """
584
+ Specifies whether automatic tidy is enabled or not.
585
+ """
586
+ return pulumi.get(self, "enabled")
587
+
588
+ @enabled.setter
589
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
590
+ pulumi.set(self, "enabled", value)
591
+
592
+ @_builtins.property
593
+ @pulumi.getter(name="intervalDuration")
594
+ def interval_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
595
+ """
596
+ Interval at which to run an auto-tidy operation. This is the time
597
+ between tidy invocations (after one finishes to the start of the next).
598
+ """
599
+ return pulumi.get(self, "interval_duration")
600
+
601
+ @interval_duration.setter
602
+ def interval_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
603
+ pulumi.set(self, "interval_duration", value)
604
+
605
+ @_builtins.property
606
+ @pulumi.getter(name="issuerSafetyBuffer")
607
+ def issuer_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
608
+ """
609
+ The amount of extra time that must have passed beyond issuer's
610
+ expiration before it is removed from the backend storage.
611
+ """
612
+ return pulumi.get(self, "issuer_safety_buffer")
613
+
614
+ @issuer_safety_buffer.setter
615
+ def issuer_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
616
+ pulumi.set(self, "issuer_safety_buffer", value)
617
+
618
+ @_builtins.property
619
+ @pulumi.getter(name="maintainStoredCertificateCounts")
620
+ def maintain_stored_certificate_counts(self) -> Optional[pulumi.Input[_builtins.bool]]:
621
+ """
622
+ This configures whether stored certificate are
623
+ counted upon initialization of the backend, and whether during normal operation, a running count
624
+ of certificates stored is maintained.
625
+ """
626
+ return pulumi.get(self, "maintain_stored_certificate_counts")
627
+
628
+ @maintain_stored_certificate_counts.setter
629
+ def maintain_stored_certificate_counts(self, value: Optional[pulumi.Input[_builtins.bool]]):
630
+ pulumi.set(self, "maintain_stored_certificate_counts", value)
631
+
632
+ @_builtins.property
633
+ @pulumi.getter(name="maxStartupBackoffDuration")
634
+ def max_startup_backoff_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
635
+ """
636
+ The maximum amount of time auto-tidy will be delayed
637
+ after startup.
638
+ """
639
+ return pulumi.get(self, "max_startup_backoff_duration")
640
+
641
+ @max_startup_backoff_duration.setter
642
+ def max_startup_backoff_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
643
+ pulumi.set(self, "max_startup_backoff_duration", value)
644
+
645
+ @_builtins.property
646
+ @pulumi.getter(name="minStartupBackoffDuration")
647
+ def min_startup_backoff_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
648
+ """
649
+ The minimum amount of time auto-tidy will be delayed
650
+ after startup.
651
+ """
652
+ return pulumi.get(self, "min_startup_backoff_duration")
653
+
654
+ @min_startup_backoff_duration.setter
655
+ def min_startup_backoff_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
656
+ pulumi.set(self, "min_startup_backoff_duration", value)
657
+
658
+ @_builtins.property
659
+ @pulumi.getter
660
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
661
+ """
662
+ The namespace of the target resource.
663
+ The value should not contain leading or trailing forward slashes.
664
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
665
+ *Available only for Vault Enterprise*.
666
+ """
667
+ return pulumi.get(self, "namespace")
668
+
669
+ @namespace.setter
670
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
671
+ pulumi.set(self, "namespace", value)
672
+
673
+ @_builtins.property
674
+ @pulumi.getter(name="pauseDuration")
675
+ def pause_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
676
+ """
677
+ The amount of time to wait between processing certificates.
678
+ """
679
+ return pulumi.get(self, "pause_duration")
680
+
681
+ @pause_duration.setter
682
+ def pause_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
683
+ pulumi.set(self, "pause_duration", value)
684
+
685
+ @_builtins.property
686
+ @pulumi.getter(name="publishStoredCertificateCountMetrics")
687
+ def publish_stored_certificate_count_metrics(self) -> Optional[pulumi.Input[_builtins.bool]]:
688
+ """
689
+ This configures whether the stored
690
+ certificate count is published to the metrics consumer.
691
+ """
692
+ return pulumi.get(self, "publish_stored_certificate_count_metrics")
693
+
694
+ @publish_stored_certificate_count_metrics.setter
695
+ def publish_stored_certificate_count_metrics(self, value: Optional[pulumi.Input[_builtins.bool]]):
696
+ pulumi.set(self, "publish_stored_certificate_count_metrics", value)
697
+
698
+ @_builtins.property
699
+ @pulumi.getter(name="revocationQueueSafetyBuffer")
700
+ def revocation_queue_safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
701
+ """
702
+ The amount of time that must pass from the
703
+ cross-cluster revocation request being initiated to when it will be slated for removal.
704
+ """
705
+ return pulumi.get(self, "revocation_queue_safety_buffer")
706
+
707
+ @revocation_queue_safety_buffer.setter
708
+ def revocation_queue_safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
709
+ pulumi.set(self, "revocation_queue_safety_buffer", value)
710
+
711
+ @_builtins.property
712
+ @pulumi.getter(name="safetyBuffer")
713
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.str]]:
714
+ """
715
+ The amount of extra time that must have passed beyond certificate
716
+ expiration before it is removed from the backend storage and/or revocation list.
717
+ """
718
+ return pulumi.get(self, "safety_buffer")
719
+
720
+ @safety_buffer.setter
721
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.str]]):
722
+ pulumi.set(self, "safety_buffer", value)
723
+
724
+ @_builtins.property
725
+ @pulumi.getter(name="tidyAcme")
726
+ def tidy_acme(self) -> Optional[pulumi.Input[_builtins.bool]]:
727
+ """
728
+ Set to true to enable tidying ACME accounts, orders and authorizations.
729
+ """
730
+ return pulumi.get(self, "tidy_acme")
731
+
732
+ @tidy_acme.setter
733
+ def tidy_acme(self, value: Optional[pulumi.Input[_builtins.bool]]):
734
+ pulumi.set(self, "tidy_acme", value)
735
+
736
+ @_builtins.property
737
+ @pulumi.getter(name="tidyCertMetadata")
738
+ def tidy_cert_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
739
+ """
740
+ Set to true to enable tidying up certificate metadata.
741
+ """
742
+ return pulumi.get(self, "tidy_cert_metadata")
743
+
744
+ @tidy_cert_metadata.setter
745
+ def tidy_cert_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
746
+ pulumi.set(self, "tidy_cert_metadata", value)
747
+
748
+ @_builtins.property
749
+ @pulumi.getter(name="tidyCertStore")
750
+ def tidy_cert_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
751
+ """
752
+ Set to true to enable tidying up the certificate store
753
+ """
754
+ return pulumi.get(self, "tidy_cert_store")
755
+
756
+ @tidy_cert_store.setter
757
+ def tidy_cert_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
758
+ pulumi.set(self, "tidy_cert_store", value)
759
+
760
+ @_builtins.property
761
+ @pulumi.getter(name="tidyCmpv2NonceStore")
762
+ def tidy_cmpv2_nonce_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
763
+ """
764
+ Set to true to enable tidying up the CMPv2 nonce store.
765
+ """
766
+ return pulumi.get(self, "tidy_cmpv2_nonce_store")
767
+
768
+ @tidy_cmpv2_nonce_store.setter
769
+ def tidy_cmpv2_nonce_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
770
+ pulumi.set(self, "tidy_cmpv2_nonce_store", value)
771
+
772
+ @_builtins.property
773
+ @pulumi.getter(name="tidyCrossClusterRevokedCerts")
774
+ def tidy_cross_cluster_revoked_certs(self) -> Optional[pulumi.Input[_builtins.bool]]:
775
+ """
776
+ Set to true to enable tidying up the cross-cluster
777
+ revoked certificate store.
778
+ """
779
+ return pulumi.get(self, "tidy_cross_cluster_revoked_certs")
780
+
781
+ @tidy_cross_cluster_revoked_certs.setter
782
+ def tidy_cross_cluster_revoked_certs(self, value: Optional[pulumi.Input[_builtins.bool]]):
783
+ pulumi.set(self, "tidy_cross_cluster_revoked_certs", value)
784
+
785
+ @_builtins.property
786
+ @pulumi.getter(name="tidyExpiredIssuers")
787
+ def tidy_expired_issuers(self) -> Optional[pulumi.Input[_builtins.bool]]:
788
+ """
789
+ Set to true to automatically remove expired issuers past the
790
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
791
+ """
792
+ return pulumi.get(self, "tidy_expired_issuers")
793
+
794
+ @tidy_expired_issuers.setter
795
+ def tidy_expired_issuers(self, value: Optional[pulumi.Input[_builtins.bool]]):
796
+ pulumi.set(self, "tidy_expired_issuers", value)
797
+
798
+ @_builtins.property
799
+ @pulumi.getter(name="tidyMoveLegacyCaBundle")
800
+ def tidy_move_legacy_ca_bundle(self) -> Optional[pulumi.Input[_builtins.bool]]:
801
+ """
802
+ Set to true to move the legacy `ca_bundle` from
803
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
804
+ """
805
+ return pulumi.get(self, "tidy_move_legacy_ca_bundle")
806
+
807
+ @tidy_move_legacy_ca_bundle.setter
808
+ def tidy_move_legacy_ca_bundle(self, value: Optional[pulumi.Input[_builtins.bool]]):
809
+ pulumi.set(self, "tidy_move_legacy_ca_bundle", value)
810
+
811
+ @_builtins.property
812
+ @pulumi.getter(name="tidyRevocationQueue")
813
+ def tidy_revocation_queue(self) -> Optional[pulumi.Input[_builtins.bool]]:
814
+ """
815
+ Set to true to remove stale revocation queue entries that
816
+ haven't been confirmed by any active cluster.
817
+ """
818
+ return pulumi.get(self, "tidy_revocation_queue")
819
+
820
+ @tidy_revocation_queue.setter
821
+ def tidy_revocation_queue(self, value: Optional[pulumi.Input[_builtins.bool]]):
822
+ pulumi.set(self, "tidy_revocation_queue", value)
823
+
824
+ @_builtins.property
825
+ @pulumi.getter(name="tidyRevokedCertIssuerAssociations")
826
+ def tidy_revoked_cert_issuer_associations(self) -> Optional[pulumi.Input[_builtins.bool]]:
827
+ """
828
+ Set to true to validate issuer associations
829
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
830
+ """
831
+ return pulumi.get(self, "tidy_revoked_cert_issuer_associations")
832
+
833
+ @tidy_revoked_cert_issuer_associations.setter
834
+ def tidy_revoked_cert_issuer_associations(self, value: Optional[pulumi.Input[_builtins.bool]]):
835
+ pulumi.set(self, "tidy_revoked_cert_issuer_associations", value)
836
+
837
+ @_builtins.property
838
+ @pulumi.getter(name="tidyRevokedCerts")
839
+ def tidy_revoked_certs(self) -> Optional[pulumi.Input[_builtins.bool]]:
840
+ """
841
+ Set to true to remove all invalid and expired certificates from
842
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
843
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
844
+ the CRL, and the CRL will be rotated.
845
+ """
846
+ return pulumi.get(self, "tidy_revoked_certs")
847
+
848
+ @tidy_revoked_certs.setter
849
+ def tidy_revoked_certs(self, value: Optional[pulumi.Input[_builtins.bool]]):
850
+ pulumi.set(self, "tidy_revoked_certs", value)
851
+
852
+
853
+ @pulumi.type_token("vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy")
854
+ class BackendConfigAutoTidy(pulumi.CustomResource):
855
+ @overload
856
+ def __init__(__self__,
857
+ resource_name: str,
858
+ opts: Optional[pulumi.ResourceOptions] = None,
859
+ acme_account_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
860
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
861
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
862
+ interval_duration: Optional[pulumi.Input[_builtins.str]] = None,
863
+ issuer_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
864
+ maintain_stored_certificate_counts: Optional[pulumi.Input[_builtins.bool]] = None,
865
+ max_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
866
+ min_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
867
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
868
+ pause_duration: Optional[pulumi.Input[_builtins.str]] = None,
869
+ publish_stored_certificate_count_metrics: Optional[pulumi.Input[_builtins.bool]] = None,
870
+ revocation_queue_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
871
+ safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
872
+ tidy_acme: Optional[pulumi.Input[_builtins.bool]] = None,
873
+ tidy_cert_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
874
+ tidy_cert_store: Optional[pulumi.Input[_builtins.bool]] = None,
875
+ tidy_cmpv2_nonce_store: Optional[pulumi.Input[_builtins.bool]] = None,
876
+ tidy_cross_cluster_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
877
+ tidy_expired_issuers: Optional[pulumi.Input[_builtins.bool]] = None,
878
+ tidy_move_legacy_ca_bundle: Optional[pulumi.Input[_builtins.bool]] = None,
879
+ tidy_revocation_queue: Optional[pulumi.Input[_builtins.bool]] = None,
880
+ tidy_revoked_cert_issuer_associations: Optional[pulumi.Input[_builtins.bool]] = None,
881
+ tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
882
+ __props__=None):
883
+ """
884
+ Allows setting the Auto Tidy configuration on a PKI Secret Backend
885
+
886
+ ## Example Usage
887
+
888
+ ```python
889
+ import pulumi
890
+ import pulumi_vault as vault
891
+
892
+ pki = vault.Mount("pki",
893
+ path="pki",
894
+ type="pki",
895
+ default_lease_ttl_seconds=3600,
896
+ max_lease_ttl_seconds=86400)
897
+ test = vault.pkisecret.BackendConfigAutoTidy("test",
898
+ backend=pki.path,
899
+ enabled=True,
900
+ tidy_cert_store=True,
901
+ interval_duration="1h")
902
+ ```
903
+
904
+ :param str resource_name: The name of the resource.
905
+ :param pulumi.ResourceOptions opts: Options for the resource.
906
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
907
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
908
+ read the configuration from, with no leading or trailing `/`s.
909
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
910
+ :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
911
+ between tidy invocations (after one finishes to the start of the next).
912
+ :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
913
+ expiration before it is removed from the backend storage.
914
+ :param pulumi.Input[_builtins.bool] maintain_stored_certificate_counts: This configures whether stored certificate are
915
+ counted upon initialization of the backend, and whether during normal operation, a running count
916
+ of certificates stored is maintained.
917
+ :param pulumi.Input[_builtins.str] max_startup_backoff_duration: The maximum amount of time auto-tidy will be delayed
918
+ after startup.
919
+ :param pulumi.Input[_builtins.str] min_startup_backoff_duration: The minimum amount of time auto-tidy will be delayed
920
+ after startup.
921
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
922
+ The value should not contain leading or trailing forward slashes.
923
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
924
+ *Available only for Vault Enterprise*.
925
+ :param pulumi.Input[_builtins.str] pause_duration: The amount of time to wait between processing certificates.
926
+ :param pulumi.Input[_builtins.bool] publish_stored_certificate_count_metrics: This configures whether the stored
927
+ certificate count is published to the metrics consumer.
928
+ :param pulumi.Input[_builtins.str] revocation_queue_safety_buffer: The amount of time that must pass from the
929
+ cross-cluster revocation request being initiated to when it will be slated for removal.
930
+ :param pulumi.Input[_builtins.str] safety_buffer: The amount of extra time that must have passed beyond certificate
931
+ expiration before it is removed from the backend storage and/or revocation list.
932
+ :param pulumi.Input[_builtins.bool] tidy_acme: Set to true to enable tidying ACME accounts, orders and authorizations.
933
+ :param pulumi.Input[_builtins.bool] tidy_cert_metadata: Set to true to enable tidying up certificate metadata.
934
+ :param pulumi.Input[_builtins.bool] tidy_cert_store: Set to true to enable tidying up the certificate store
935
+ :param pulumi.Input[_builtins.bool] tidy_cmpv2_nonce_store: Set to true to enable tidying up the CMPv2 nonce store.
936
+ :param pulumi.Input[_builtins.bool] tidy_cross_cluster_revoked_certs: Set to true to enable tidying up the cross-cluster
937
+ revoked certificate store.
938
+ :param pulumi.Input[_builtins.bool] tidy_expired_issuers: Set to true to automatically remove expired issuers past the
939
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
940
+ :param pulumi.Input[_builtins.bool] tidy_move_legacy_ca_bundle: Set to true to move the legacy `ca_bundle` from
941
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
942
+ :param pulumi.Input[_builtins.bool] tidy_revocation_queue: Set to true to remove stale revocation queue entries that
943
+ haven't been confirmed by any active cluster.
944
+ :param pulumi.Input[_builtins.bool] tidy_revoked_cert_issuer_associations: Set to true to validate issuer associations
945
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
946
+ :param pulumi.Input[_builtins.bool] tidy_revoked_certs: Set to true to remove all invalid and expired certificates from
947
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
948
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
949
+ the CRL, and the CRL will be rotated.
950
+ """
951
+ ...
952
+ @overload
953
+ def __init__(__self__,
954
+ resource_name: str,
955
+ args: BackendConfigAutoTidyArgs,
956
+ opts: Optional[pulumi.ResourceOptions] = None):
957
+ """
958
+ Allows setting the Auto Tidy configuration on a PKI Secret Backend
959
+
960
+ ## Example Usage
961
+
962
+ ```python
963
+ import pulumi
964
+ import pulumi_vault as vault
965
+
966
+ pki = vault.Mount("pki",
967
+ path="pki",
968
+ type="pki",
969
+ default_lease_ttl_seconds=3600,
970
+ max_lease_ttl_seconds=86400)
971
+ test = vault.pkisecret.BackendConfigAutoTidy("test",
972
+ backend=pki.path,
973
+ enabled=True,
974
+ tidy_cert_store=True,
975
+ interval_duration="1h")
976
+ ```
977
+
978
+ :param str resource_name: The name of the resource.
979
+ :param BackendConfigAutoTidyArgs args: The arguments to use to populate this resource's properties.
980
+ :param pulumi.ResourceOptions opts: Options for the resource.
981
+ """
982
+ ...
983
+ def __init__(__self__, resource_name: str, *args, **kwargs):
984
+ resource_args, opts = _utilities.get_resource_args_opts(BackendConfigAutoTidyArgs, pulumi.ResourceOptions, *args, **kwargs)
985
+ if resource_args is not None:
986
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
987
+ else:
988
+ __self__._internal_init(resource_name, *args, **kwargs)
989
+
990
+ def _internal_init(__self__,
991
+ resource_name: str,
992
+ opts: Optional[pulumi.ResourceOptions] = None,
993
+ acme_account_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
994
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
995
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
996
+ interval_duration: Optional[pulumi.Input[_builtins.str]] = None,
997
+ issuer_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
998
+ maintain_stored_certificate_counts: Optional[pulumi.Input[_builtins.bool]] = None,
999
+ max_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
1000
+ min_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
1001
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1002
+ pause_duration: Optional[pulumi.Input[_builtins.str]] = None,
1003
+ publish_stored_certificate_count_metrics: Optional[pulumi.Input[_builtins.bool]] = None,
1004
+ revocation_queue_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1005
+ safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ tidy_acme: Optional[pulumi.Input[_builtins.bool]] = None,
1007
+ tidy_cert_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
1008
+ tidy_cert_store: Optional[pulumi.Input[_builtins.bool]] = None,
1009
+ tidy_cmpv2_nonce_store: Optional[pulumi.Input[_builtins.bool]] = None,
1010
+ tidy_cross_cluster_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
1011
+ tidy_expired_issuers: Optional[pulumi.Input[_builtins.bool]] = None,
1012
+ tidy_move_legacy_ca_bundle: Optional[pulumi.Input[_builtins.bool]] = None,
1013
+ tidy_revocation_queue: Optional[pulumi.Input[_builtins.bool]] = None,
1014
+ tidy_revoked_cert_issuer_associations: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
1016
+ __props__=None):
1017
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1018
+ if not isinstance(opts, pulumi.ResourceOptions):
1019
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
1020
+ if opts.id is None:
1021
+ if __props__ is not None:
1022
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
1023
+ __props__ = BackendConfigAutoTidyArgs.__new__(BackendConfigAutoTidyArgs)
1024
+
1025
+ __props__.__dict__["acme_account_safety_buffer"] = acme_account_safety_buffer
1026
+ if backend is None and not opts.urn:
1027
+ raise TypeError("Missing required property 'backend'")
1028
+ __props__.__dict__["backend"] = backend
1029
+ if enabled is None and not opts.urn:
1030
+ raise TypeError("Missing required property 'enabled'")
1031
+ __props__.__dict__["enabled"] = enabled
1032
+ __props__.__dict__["interval_duration"] = interval_duration
1033
+ __props__.__dict__["issuer_safety_buffer"] = issuer_safety_buffer
1034
+ __props__.__dict__["maintain_stored_certificate_counts"] = maintain_stored_certificate_counts
1035
+ __props__.__dict__["max_startup_backoff_duration"] = max_startup_backoff_duration
1036
+ __props__.__dict__["min_startup_backoff_duration"] = min_startup_backoff_duration
1037
+ __props__.__dict__["namespace"] = namespace
1038
+ __props__.__dict__["pause_duration"] = pause_duration
1039
+ __props__.__dict__["publish_stored_certificate_count_metrics"] = publish_stored_certificate_count_metrics
1040
+ __props__.__dict__["revocation_queue_safety_buffer"] = revocation_queue_safety_buffer
1041
+ __props__.__dict__["safety_buffer"] = safety_buffer
1042
+ __props__.__dict__["tidy_acme"] = tidy_acme
1043
+ __props__.__dict__["tidy_cert_metadata"] = tidy_cert_metadata
1044
+ __props__.__dict__["tidy_cert_store"] = tidy_cert_store
1045
+ __props__.__dict__["tidy_cmpv2_nonce_store"] = tidy_cmpv2_nonce_store
1046
+ __props__.__dict__["tidy_cross_cluster_revoked_certs"] = tidy_cross_cluster_revoked_certs
1047
+ __props__.__dict__["tidy_expired_issuers"] = tidy_expired_issuers
1048
+ __props__.__dict__["tidy_move_legacy_ca_bundle"] = tidy_move_legacy_ca_bundle
1049
+ __props__.__dict__["tidy_revocation_queue"] = tidy_revocation_queue
1050
+ __props__.__dict__["tidy_revoked_cert_issuer_associations"] = tidy_revoked_cert_issuer_associations
1051
+ __props__.__dict__["tidy_revoked_certs"] = tidy_revoked_certs
1052
+ super(BackendConfigAutoTidy, __self__).__init__(
1053
+ 'vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy',
1054
+ resource_name,
1055
+ __props__,
1056
+ opts)
1057
+
1058
+ @staticmethod
1059
+ def get(resource_name: str,
1060
+ id: pulumi.Input[str],
1061
+ opts: Optional[pulumi.ResourceOptions] = None,
1062
+ acme_account_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1063
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1064
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1065
+ interval_duration: Optional[pulumi.Input[_builtins.str]] = None,
1066
+ issuer_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1067
+ maintain_stored_certificate_counts: Optional[pulumi.Input[_builtins.bool]] = None,
1068
+ max_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
1069
+ min_startup_backoff_duration: Optional[pulumi.Input[_builtins.str]] = None,
1070
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1071
+ pause_duration: Optional[pulumi.Input[_builtins.str]] = None,
1072
+ publish_stored_certificate_count_metrics: Optional[pulumi.Input[_builtins.bool]] = None,
1073
+ revocation_queue_safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1074
+ safety_buffer: Optional[pulumi.Input[_builtins.str]] = None,
1075
+ tidy_acme: Optional[pulumi.Input[_builtins.bool]] = None,
1076
+ tidy_cert_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
1077
+ tidy_cert_store: Optional[pulumi.Input[_builtins.bool]] = None,
1078
+ tidy_cmpv2_nonce_store: Optional[pulumi.Input[_builtins.bool]] = None,
1079
+ tidy_cross_cluster_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None,
1080
+ tidy_expired_issuers: Optional[pulumi.Input[_builtins.bool]] = None,
1081
+ tidy_move_legacy_ca_bundle: Optional[pulumi.Input[_builtins.bool]] = None,
1082
+ tidy_revocation_queue: Optional[pulumi.Input[_builtins.bool]] = None,
1083
+ tidy_revoked_cert_issuer_associations: Optional[pulumi.Input[_builtins.bool]] = None,
1084
+ tidy_revoked_certs: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigAutoTidy':
1085
+ """
1086
+ Get an existing BackendConfigAutoTidy resource's state with the given name, id, and optional extra
1087
+ properties used to qualify the lookup.
1088
+
1089
+ :param str resource_name: The unique name of the resulting resource.
1090
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1091
+ :param pulumi.ResourceOptions opts: Options for the resource.
1092
+ :param pulumi.Input[_builtins.str] acme_account_safety_buffer: The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1093
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
1094
+ read the configuration from, with no leading or trailing `/`s.
1095
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether automatic tidy is enabled or not.
1096
+ :param pulumi.Input[_builtins.str] interval_duration: Interval at which to run an auto-tidy operation. This is the time
1097
+ between tidy invocations (after one finishes to the start of the next).
1098
+ :param pulumi.Input[_builtins.str] issuer_safety_buffer: The amount of extra time that must have passed beyond issuer's
1099
+ expiration before it is removed from the backend storage.
1100
+ :param pulumi.Input[_builtins.bool] maintain_stored_certificate_counts: This configures whether stored certificate are
1101
+ counted upon initialization of the backend, and whether during normal operation, a running count
1102
+ of certificates stored is maintained.
1103
+ :param pulumi.Input[_builtins.str] max_startup_backoff_duration: The maximum amount of time auto-tidy will be delayed
1104
+ after startup.
1105
+ :param pulumi.Input[_builtins.str] min_startup_backoff_duration: The minimum amount of time auto-tidy will be delayed
1106
+ after startup.
1107
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
1108
+ The value should not contain leading or trailing forward slashes.
1109
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1110
+ *Available only for Vault Enterprise*.
1111
+ :param pulumi.Input[_builtins.str] pause_duration: The amount of time to wait between processing certificates.
1112
+ :param pulumi.Input[_builtins.bool] publish_stored_certificate_count_metrics: This configures whether the stored
1113
+ certificate count is published to the metrics consumer.
1114
+ :param pulumi.Input[_builtins.str] revocation_queue_safety_buffer: The amount of time that must pass from the
1115
+ cross-cluster revocation request being initiated to when it will be slated for removal.
1116
+ :param pulumi.Input[_builtins.str] safety_buffer: The amount of extra time that must have passed beyond certificate
1117
+ expiration before it is removed from the backend storage and/or revocation list.
1118
+ :param pulumi.Input[_builtins.bool] tidy_acme: Set to true to enable tidying ACME accounts, orders and authorizations.
1119
+ :param pulumi.Input[_builtins.bool] tidy_cert_metadata: Set to true to enable tidying up certificate metadata.
1120
+ :param pulumi.Input[_builtins.bool] tidy_cert_store: Set to true to enable tidying up the certificate store
1121
+ :param pulumi.Input[_builtins.bool] tidy_cmpv2_nonce_store: Set to true to enable tidying up the CMPv2 nonce store.
1122
+ :param pulumi.Input[_builtins.bool] tidy_cross_cluster_revoked_certs: Set to true to enable tidying up the cross-cluster
1123
+ revoked certificate store.
1124
+ :param pulumi.Input[_builtins.bool] tidy_expired_issuers: Set to true to automatically remove expired issuers past the
1125
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
1126
+ :param pulumi.Input[_builtins.bool] tidy_move_legacy_ca_bundle: Set to true to move the legacy `ca_bundle` from
1127
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
1128
+ :param pulumi.Input[_builtins.bool] tidy_revocation_queue: Set to true to remove stale revocation queue entries that
1129
+ haven't been confirmed by any active cluster.
1130
+ :param pulumi.Input[_builtins.bool] tidy_revoked_cert_issuer_associations: Set to true to validate issuer associations
1131
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
1132
+ :param pulumi.Input[_builtins.bool] tidy_revoked_certs: Set to true to remove all invalid and expired certificates from
1133
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
1134
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
1135
+ the CRL, and the CRL will be rotated.
1136
+ """
1137
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1138
+
1139
+ __props__ = _BackendConfigAutoTidyState.__new__(_BackendConfigAutoTidyState)
1140
+
1141
+ __props__.__dict__["acme_account_safety_buffer"] = acme_account_safety_buffer
1142
+ __props__.__dict__["backend"] = backend
1143
+ __props__.__dict__["enabled"] = enabled
1144
+ __props__.__dict__["interval_duration"] = interval_duration
1145
+ __props__.__dict__["issuer_safety_buffer"] = issuer_safety_buffer
1146
+ __props__.__dict__["maintain_stored_certificate_counts"] = maintain_stored_certificate_counts
1147
+ __props__.__dict__["max_startup_backoff_duration"] = max_startup_backoff_duration
1148
+ __props__.__dict__["min_startup_backoff_duration"] = min_startup_backoff_duration
1149
+ __props__.__dict__["namespace"] = namespace
1150
+ __props__.__dict__["pause_duration"] = pause_duration
1151
+ __props__.__dict__["publish_stored_certificate_count_metrics"] = publish_stored_certificate_count_metrics
1152
+ __props__.__dict__["revocation_queue_safety_buffer"] = revocation_queue_safety_buffer
1153
+ __props__.__dict__["safety_buffer"] = safety_buffer
1154
+ __props__.__dict__["tidy_acme"] = tidy_acme
1155
+ __props__.__dict__["tidy_cert_metadata"] = tidy_cert_metadata
1156
+ __props__.__dict__["tidy_cert_store"] = tidy_cert_store
1157
+ __props__.__dict__["tidy_cmpv2_nonce_store"] = tidy_cmpv2_nonce_store
1158
+ __props__.__dict__["tidy_cross_cluster_revoked_certs"] = tidy_cross_cluster_revoked_certs
1159
+ __props__.__dict__["tidy_expired_issuers"] = tidy_expired_issuers
1160
+ __props__.__dict__["tidy_move_legacy_ca_bundle"] = tidy_move_legacy_ca_bundle
1161
+ __props__.__dict__["tidy_revocation_queue"] = tidy_revocation_queue
1162
+ __props__.__dict__["tidy_revoked_cert_issuer_associations"] = tidy_revoked_cert_issuer_associations
1163
+ __props__.__dict__["tidy_revoked_certs"] = tidy_revoked_certs
1164
+ return BackendConfigAutoTidy(resource_name, opts=opts, __props__=__props__)
1165
+
1166
+ @_builtins.property
1167
+ @pulumi.getter(name="acmeAccountSafetyBuffer")
1168
+ def acme_account_safety_buffer(self) -> pulumi.Output[_builtins.str]:
1169
+ """
1170
+ The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
1171
+ """
1172
+ return pulumi.get(self, "acme_account_safety_buffer")
1173
+
1174
+ @_builtins.property
1175
+ @pulumi.getter
1176
+ def backend(self) -> pulumi.Output[_builtins.str]:
1177
+ """
1178
+ The path to the PKI secret backend to
1179
+ read the configuration from, with no leading or trailing `/`s.
1180
+ """
1181
+ return pulumi.get(self, "backend")
1182
+
1183
+ @_builtins.property
1184
+ @pulumi.getter
1185
+ def enabled(self) -> pulumi.Output[_builtins.bool]:
1186
+ """
1187
+ Specifies whether automatic tidy is enabled or not.
1188
+ """
1189
+ return pulumi.get(self, "enabled")
1190
+
1191
+ @_builtins.property
1192
+ @pulumi.getter(name="intervalDuration")
1193
+ def interval_duration(self) -> pulumi.Output[_builtins.str]:
1194
+ """
1195
+ Interval at which to run an auto-tidy operation. This is the time
1196
+ between tidy invocations (after one finishes to the start of the next).
1197
+ """
1198
+ return pulumi.get(self, "interval_duration")
1199
+
1200
+ @_builtins.property
1201
+ @pulumi.getter(name="issuerSafetyBuffer")
1202
+ def issuer_safety_buffer(self) -> pulumi.Output[_builtins.str]:
1203
+ """
1204
+ The amount of extra time that must have passed beyond issuer's
1205
+ expiration before it is removed from the backend storage.
1206
+ """
1207
+ return pulumi.get(self, "issuer_safety_buffer")
1208
+
1209
+ @_builtins.property
1210
+ @pulumi.getter(name="maintainStoredCertificateCounts")
1211
+ def maintain_stored_certificate_counts(self) -> pulumi.Output[Optional[_builtins.bool]]:
1212
+ """
1213
+ This configures whether stored certificate are
1214
+ counted upon initialization of the backend, and whether during normal operation, a running count
1215
+ of certificates stored is maintained.
1216
+ """
1217
+ return pulumi.get(self, "maintain_stored_certificate_counts")
1218
+
1219
+ @_builtins.property
1220
+ @pulumi.getter(name="maxStartupBackoffDuration")
1221
+ def max_startup_backoff_duration(self) -> pulumi.Output[_builtins.str]:
1222
+ """
1223
+ The maximum amount of time auto-tidy will be delayed
1224
+ after startup.
1225
+ """
1226
+ return pulumi.get(self, "max_startup_backoff_duration")
1227
+
1228
+ @_builtins.property
1229
+ @pulumi.getter(name="minStartupBackoffDuration")
1230
+ def min_startup_backoff_duration(self) -> pulumi.Output[_builtins.str]:
1231
+ """
1232
+ The minimum amount of time auto-tidy will be delayed
1233
+ after startup.
1234
+ """
1235
+ return pulumi.get(self, "min_startup_backoff_duration")
1236
+
1237
+ @_builtins.property
1238
+ @pulumi.getter
1239
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1240
+ """
1241
+ The namespace of the target resource.
1242
+ The value should not contain leading or trailing forward slashes.
1243
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1244
+ *Available only for Vault Enterprise*.
1245
+ """
1246
+ return pulumi.get(self, "namespace")
1247
+
1248
+ @_builtins.property
1249
+ @pulumi.getter(name="pauseDuration")
1250
+ def pause_duration(self) -> pulumi.Output[_builtins.str]:
1251
+ """
1252
+ The amount of time to wait between processing certificates.
1253
+ """
1254
+ return pulumi.get(self, "pause_duration")
1255
+
1256
+ @_builtins.property
1257
+ @pulumi.getter(name="publishStoredCertificateCountMetrics")
1258
+ def publish_stored_certificate_count_metrics(self) -> pulumi.Output[Optional[_builtins.bool]]:
1259
+ """
1260
+ This configures whether the stored
1261
+ certificate count is published to the metrics consumer.
1262
+ """
1263
+ return pulumi.get(self, "publish_stored_certificate_count_metrics")
1264
+
1265
+ @_builtins.property
1266
+ @pulumi.getter(name="revocationQueueSafetyBuffer")
1267
+ def revocation_queue_safety_buffer(self) -> pulumi.Output[_builtins.str]:
1268
+ """
1269
+ The amount of time that must pass from the
1270
+ cross-cluster revocation request being initiated to when it will be slated for removal.
1271
+ """
1272
+ return pulumi.get(self, "revocation_queue_safety_buffer")
1273
+
1274
+ @_builtins.property
1275
+ @pulumi.getter(name="safetyBuffer")
1276
+ def safety_buffer(self) -> pulumi.Output[_builtins.str]:
1277
+ """
1278
+ The amount of extra time that must have passed beyond certificate
1279
+ expiration before it is removed from the backend storage and/or revocation list.
1280
+ """
1281
+ return pulumi.get(self, "safety_buffer")
1282
+
1283
+ @_builtins.property
1284
+ @pulumi.getter(name="tidyAcme")
1285
+ def tidy_acme(self) -> pulumi.Output[Optional[_builtins.bool]]:
1286
+ """
1287
+ Set to true to enable tidying ACME accounts, orders and authorizations.
1288
+ """
1289
+ return pulumi.get(self, "tidy_acme")
1290
+
1291
+ @_builtins.property
1292
+ @pulumi.getter(name="tidyCertMetadata")
1293
+ def tidy_cert_metadata(self) -> pulumi.Output[Optional[_builtins.bool]]:
1294
+ """
1295
+ Set to true to enable tidying up certificate metadata.
1296
+ """
1297
+ return pulumi.get(self, "tidy_cert_metadata")
1298
+
1299
+ @_builtins.property
1300
+ @pulumi.getter(name="tidyCertStore")
1301
+ def tidy_cert_store(self) -> pulumi.Output[Optional[_builtins.bool]]:
1302
+ """
1303
+ Set to true to enable tidying up the certificate store
1304
+ """
1305
+ return pulumi.get(self, "tidy_cert_store")
1306
+
1307
+ @_builtins.property
1308
+ @pulumi.getter(name="tidyCmpv2NonceStore")
1309
+ def tidy_cmpv2_nonce_store(self) -> pulumi.Output[Optional[_builtins.bool]]:
1310
+ """
1311
+ Set to true to enable tidying up the CMPv2 nonce store.
1312
+ """
1313
+ return pulumi.get(self, "tidy_cmpv2_nonce_store")
1314
+
1315
+ @_builtins.property
1316
+ @pulumi.getter(name="tidyCrossClusterRevokedCerts")
1317
+ def tidy_cross_cluster_revoked_certs(self) -> pulumi.Output[Optional[_builtins.bool]]:
1318
+ """
1319
+ Set to true to enable tidying up the cross-cluster
1320
+ revoked certificate store.
1321
+ """
1322
+ return pulumi.get(self, "tidy_cross_cluster_revoked_certs")
1323
+
1324
+ @_builtins.property
1325
+ @pulumi.getter(name="tidyExpiredIssuers")
1326
+ def tidy_expired_issuers(self) -> pulumi.Output[Optional[_builtins.bool]]:
1327
+ """
1328
+ Set to true to automatically remove expired issuers past the
1329
+ `issuer_safety_buffer`. No keys will be removed as part of this operation.
1330
+ """
1331
+ return pulumi.get(self, "tidy_expired_issuers")
1332
+
1333
+ @_builtins.property
1334
+ @pulumi.getter(name="tidyMoveLegacyCaBundle")
1335
+ def tidy_move_legacy_ca_bundle(self) -> pulumi.Output[Optional[_builtins.bool]]:
1336
+ """
1337
+ Set to true to move the legacy `ca_bundle` from
1338
+ `/config/ca_bundle` to `/config/ca_bundle.bak`.
1339
+ """
1340
+ return pulumi.get(self, "tidy_move_legacy_ca_bundle")
1341
+
1342
+ @_builtins.property
1343
+ @pulumi.getter(name="tidyRevocationQueue")
1344
+ def tidy_revocation_queue(self) -> pulumi.Output[Optional[_builtins.bool]]:
1345
+ """
1346
+ Set to true to remove stale revocation queue entries that
1347
+ haven't been confirmed by any active cluster.
1348
+ """
1349
+ return pulumi.get(self, "tidy_revocation_queue")
1350
+
1351
+ @_builtins.property
1352
+ @pulumi.getter(name="tidyRevokedCertIssuerAssociations")
1353
+ def tidy_revoked_cert_issuer_associations(self) -> pulumi.Output[Optional[_builtins.bool]]:
1354
+ """
1355
+ Set to true to validate issuer associations
1356
+ on revocation entries. This helps increase the performance of CRL building and OCSP responses.
1357
+ """
1358
+ return pulumi.get(self, "tidy_revoked_cert_issuer_associations")
1359
+
1360
+ @_builtins.property
1361
+ @pulumi.getter(name="tidyRevokedCerts")
1362
+ def tidy_revoked_certs(self) -> pulumi.Output[Optional[_builtins.bool]]:
1363
+ """
1364
+ Set to true to remove all invalid and expired certificates from
1365
+ storage. A revoked storage entry is considered invalid if the entry is empty, or the value within
1366
+ the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from
1367
+ the CRL, and the CRL will be rotated.
1368
+ """
1369
+ return pulumi.get(self, "tidy_revoked_certs")
1370
+