pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,846 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendCrlConfigArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
25
+ cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ expiry: Optional[pulumi.Input[_builtins.str]] = None,
30
+ max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
34
+ unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None):
36
+ """
37
+ The set of arguments for constructing a SecretBackendCrlConfig resource.
38
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
39
+ :param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
40
+ :param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
41
+ :param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
42
+ :param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
43
+ :param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
44
+ :param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
45
+ augmenting the last complete CRL. **Vault 1.12+**
46
+ :param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
47
+ :param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
48
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
49
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
50
+ The value should not contain leading or trailing forward slashes.
51
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
52
+ *Available only for Vault Enterprise*.
53
+ :param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
54
+ :param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
55
+ refresh durations. **Vault 1.12+**
56
+ :param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
57
+ :param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
58
+ cluster-local paths. **Vault 1.13+**
59
+ """
60
+ pulumi.set(__self__, "backend", backend)
61
+ if auto_rebuild is not None:
62
+ pulumi.set(__self__, "auto_rebuild", auto_rebuild)
63
+ if auto_rebuild_grace_period is not None:
64
+ pulumi.set(__self__, "auto_rebuild_grace_period", auto_rebuild_grace_period)
65
+ if cross_cluster_revocation is not None:
66
+ pulumi.set(__self__, "cross_cluster_revocation", cross_cluster_revocation)
67
+ if delta_rebuild_interval is not None:
68
+ pulumi.set(__self__, "delta_rebuild_interval", delta_rebuild_interval)
69
+ if disable is not None:
70
+ pulumi.set(__self__, "disable", disable)
71
+ if enable_delta is not None:
72
+ pulumi.set(__self__, "enable_delta", enable_delta)
73
+ if expiry is not None:
74
+ pulumi.set(__self__, "expiry", expiry)
75
+ if max_crl_entries is not None:
76
+ pulumi.set(__self__, "max_crl_entries", max_crl_entries)
77
+ if namespace is not None:
78
+ pulumi.set(__self__, "namespace", namespace)
79
+ if ocsp_disable is not None:
80
+ pulumi.set(__self__, "ocsp_disable", ocsp_disable)
81
+ if ocsp_expiry is not None:
82
+ pulumi.set(__self__, "ocsp_expiry", ocsp_expiry)
83
+ if unified_crl is not None:
84
+ pulumi.set(__self__, "unified_crl", unified_crl)
85
+ if unified_crl_on_existing_paths is not None:
86
+ pulumi.set(__self__, "unified_crl_on_existing_paths", unified_crl_on_existing_paths)
87
+
88
+ @_builtins.property
89
+ @pulumi.getter
90
+ def backend(self) -> pulumi.Input[_builtins.str]:
91
+ """
92
+ The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
93
+ """
94
+ return pulumi.get(self, "backend")
95
+
96
+ @backend.setter
97
+ def backend(self, value: pulumi.Input[_builtins.str]):
98
+ pulumi.set(self, "backend", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="autoRebuild")
102
+ def auto_rebuild(self) -> Optional[pulumi.Input[_builtins.bool]]:
103
+ """
104
+ Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
105
+ """
106
+ return pulumi.get(self, "auto_rebuild")
107
+
108
+ @auto_rebuild.setter
109
+ def auto_rebuild(self, value: Optional[pulumi.Input[_builtins.bool]]):
110
+ pulumi.set(self, "auto_rebuild", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter(name="autoRebuildGracePeriod")
114
+ def auto_rebuild_grace_period(self) -> Optional[pulumi.Input[_builtins.str]]:
115
+ """
116
+ Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
117
+ """
118
+ return pulumi.get(self, "auto_rebuild_grace_period")
119
+
120
+ @auto_rebuild_grace_period.setter
121
+ def auto_rebuild_grace_period(self, value: Optional[pulumi.Input[_builtins.str]]):
122
+ pulumi.set(self, "auto_rebuild_grace_period", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter(name="crossClusterRevocation")
126
+ def cross_cluster_revocation(self) -> Optional[pulumi.Input[_builtins.bool]]:
127
+ """
128
+ Enable cross-cluster revocation request queues. **Vault 1.13+**
129
+ """
130
+ return pulumi.get(self, "cross_cluster_revocation")
131
+
132
+ @cross_cluster_revocation.setter
133
+ def cross_cluster_revocation(self, value: Optional[pulumi.Input[_builtins.bool]]):
134
+ pulumi.set(self, "cross_cluster_revocation", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter(name="deltaRebuildInterval")
138
+ def delta_rebuild_interval(self) -> Optional[pulumi.Input[_builtins.str]]:
139
+ """
140
+ Interval to check for new revocations on, to regenerate the delta CRL.
141
+ """
142
+ return pulumi.get(self, "delta_rebuild_interval")
143
+
144
+ @delta_rebuild_interval.setter
145
+ def delta_rebuild_interval(self, value: Optional[pulumi.Input[_builtins.str]]):
146
+ pulumi.set(self, "delta_rebuild_interval", value)
147
+
148
+ @_builtins.property
149
+ @pulumi.getter
150
+ def disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
151
+ """
152
+ Disables or enables CRL building.
153
+ """
154
+ return pulumi.get(self, "disable")
155
+
156
+ @disable.setter
157
+ def disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
158
+ pulumi.set(self, "disable", value)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="enableDelta")
162
+ def enable_delta(self) -> Optional[pulumi.Input[_builtins.bool]]:
163
+ """
164
+ Enables building of delta CRLs with up-to-date revocation information,
165
+ augmenting the last complete CRL. **Vault 1.12+**
166
+ """
167
+ return pulumi.get(self, "enable_delta")
168
+
169
+ @enable_delta.setter
170
+ def enable_delta(self, value: Optional[pulumi.Input[_builtins.bool]]):
171
+ pulumi.set(self, "enable_delta", value)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter
175
+ def expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
176
+ """
177
+ Specifies the time until expiration.
178
+ """
179
+ return pulumi.get(self, "expiry")
180
+
181
+ @expiry.setter
182
+ def expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
183
+ pulumi.set(self, "expiry", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="maxCrlEntries")
187
+ def max_crl_entries(self) -> Optional[pulumi.Input[_builtins.int]]:
188
+ """
189
+ The maximum number of entries a CRL can contain. This option exists to prevent
190
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
191
+ """
192
+ return pulumi.get(self, "max_crl_entries")
193
+
194
+ @max_crl_entries.setter
195
+ def max_crl_entries(self, value: Optional[pulumi.Input[_builtins.int]]):
196
+ pulumi.set(self, "max_crl_entries", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter
200
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
201
+ """
202
+ The namespace to provision the resource in.
203
+ The value should not contain leading or trailing forward slashes.
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
205
+ *Available only for Vault Enterprise*.
206
+ """
207
+ return pulumi.get(self, "namespace")
208
+
209
+ @namespace.setter
210
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
211
+ pulumi.set(self, "namespace", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="ocspDisable")
215
+ def ocsp_disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
216
+ """
217
+ Disables the OCSP responder in Vault. **Vault 1.12+**
218
+ """
219
+ return pulumi.get(self, "ocsp_disable")
220
+
221
+ @ocsp_disable.setter
222
+ def ocsp_disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
223
+ pulumi.set(self, "ocsp_disable", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="ocspExpiry")
227
+ def ocsp_expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ The amount of time an OCSP response can be cached for, useful for OCSP stapling
230
+ refresh durations. **Vault 1.12+**
231
+ """
232
+ return pulumi.get(self, "ocsp_expiry")
233
+
234
+ @ocsp_expiry.setter
235
+ def ocsp_expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
236
+ pulumi.set(self, "ocsp_expiry", value)
237
+
238
+ @_builtins.property
239
+ @pulumi.getter(name="unifiedCrl")
240
+ def unified_crl(self) -> Optional[pulumi.Input[_builtins.bool]]:
241
+ """
242
+ Enables unified CRL and OCSP building. **Vault 1.13+**
243
+ """
244
+ return pulumi.get(self, "unified_crl")
245
+
246
+ @unified_crl.setter
247
+ def unified_crl(self, value: Optional[pulumi.Input[_builtins.bool]]):
248
+ pulumi.set(self, "unified_crl", value)
249
+
250
+ @_builtins.property
251
+ @pulumi.getter(name="unifiedCrlOnExistingPaths")
252
+ def unified_crl_on_existing_paths(self) -> Optional[pulumi.Input[_builtins.bool]]:
253
+ """
254
+ Enables serving the unified CRL and OCSP on the existing, previously
255
+ cluster-local paths. **Vault 1.13+**
256
+ """
257
+ return pulumi.get(self, "unified_crl_on_existing_paths")
258
+
259
+ @unified_crl_on_existing_paths.setter
260
+ def unified_crl_on_existing_paths(self, value: Optional[pulumi.Input[_builtins.bool]]):
261
+ pulumi.set(self, "unified_crl_on_existing_paths", value)
262
+
263
+
264
+ @pulumi.input_type
265
+ class _SecretBackendCrlConfigState:
266
+ def __init__(__self__, *,
267
+ auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
268
+ auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
269
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
270
+ cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
271
+ delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
272
+ disable: Optional[pulumi.Input[_builtins.bool]] = None,
273
+ enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
274
+ expiry: Optional[pulumi.Input[_builtins.str]] = None,
275
+ max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
276
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
277
+ ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
278
+ ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
279
+ unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
280
+ unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None):
281
+ """
282
+ Input properties used for looking up and filtering SecretBackendCrlConfig resources.
283
+ :param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
284
+ :param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
285
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
286
+ :param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
287
+ :param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
288
+ :param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
289
+ :param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
290
+ augmenting the last complete CRL. **Vault 1.12+**
291
+ :param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
292
+ :param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
293
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
294
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
295
+ The value should not contain leading or trailing forward slashes.
296
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
297
+ *Available only for Vault Enterprise*.
298
+ :param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
299
+ :param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
300
+ refresh durations. **Vault 1.12+**
301
+ :param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
302
+ :param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
303
+ cluster-local paths. **Vault 1.13+**
304
+ """
305
+ if auto_rebuild is not None:
306
+ pulumi.set(__self__, "auto_rebuild", auto_rebuild)
307
+ if auto_rebuild_grace_period is not None:
308
+ pulumi.set(__self__, "auto_rebuild_grace_period", auto_rebuild_grace_period)
309
+ if backend is not None:
310
+ pulumi.set(__self__, "backend", backend)
311
+ if cross_cluster_revocation is not None:
312
+ pulumi.set(__self__, "cross_cluster_revocation", cross_cluster_revocation)
313
+ if delta_rebuild_interval is not None:
314
+ pulumi.set(__self__, "delta_rebuild_interval", delta_rebuild_interval)
315
+ if disable is not None:
316
+ pulumi.set(__self__, "disable", disable)
317
+ if enable_delta is not None:
318
+ pulumi.set(__self__, "enable_delta", enable_delta)
319
+ if expiry is not None:
320
+ pulumi.set(__self__, "expiry", expiry)
321
+ if max_crl_entries is not None:
322
+ pulumi.set(__self__, "max_crl_entries", max_crl_entries)
323
+ if namespace is not None:
324
+ pulumi.set(__self__, "namespace", namespace)
325
+ if ocsp_disable is not None:
326
+ pulumi.set(__self__, "ocsp_disable", ocsp_disable)
327
+ if ocsp_expiry is not None:
328
+ pulumi.set(__self__, "ocsp_expiry", ocsp_expiry)
329
+ if unified_crl is not None:
330
+ pulumi.set(__self__, "unified_crl", unified_crl)
331
+ if unified_crl_on_existing_paths is not None:
332
+ pulumi.set(__self__, "unified_crl_on_existing_paths", unified_crl_on_existing_paths)
333
+
334
+ @_builtins.property
335
+ @pulumi.getter(name="autoRebuild")
336
+ def auto_rebuild(self) -> Optional[pulumi.Input[_builtins.bool]]:
337
+ """
338
+ Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
339
+ """
340
+ return pulumi.get(self, "auto_rebuild")
341
+
342
+ @auto_rebuild.setter
343
+ def auto_rebuild(self, value: Optional[pulumi.Input[_builtins.bool]]):
344
+ pulumi.set(self, "auto_rebuild", value)
345
+
346
+ @_builtins.property
347
+ @pulumi.getter(name="autoRebuildGracePeriod")
348
+ def auto_rebuild_grace_period(self) -> Optional[pulumi.Input[_builtins.str]]:
349
+ """
350
+ Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
351
+ """
352
+ return pulumi.get(self, "auto_rebuild_grace_period")
353
+
354
+ @auto_rebuild_grace_period.setter
355
+ def auto_rebuild_grace_period(self, value: Optional[pulumi.Input[_builtins.str]]):
356
+ pulumi.set(self, "auto_rebuild_grace_period", value)
357
+
358
+ @_builtins.property
359
+ @pulumi.getter
360
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
361
+ """
362
+ The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
363
+ """
364
+ return pulumi.get(self, "backend")
365
+
366
+ @backend.setter
367
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
368
+ pulumi.set(self, "backend", value)
369
+
370
+ @_builtins.property
371
+ @pulumi.getter(name="crossClusterRevocation")
372
+ def cross_cluster_revocation(self) -> Optional[pulumi.Input[_builtins.bool]]:
373
+ """
374
+ Enable cross-cluster revocation request queues. **Vault 1.13+**
375
+ """
376
+ return pulumi.get(self, "cross_cluster_revocation")
377
+
378
+ @cross_cluster_revocation.setter
379
+ def cross_cluster_revocation(self, value: Optional[pulumi.Input[_builtins.bool]]):
380
+ pulumi.set(self, "cross_cluster_revocation", value)
381
+
382
+ @_builtins.property
383
+ @pulumi.getter(name="deltaRebuildInterval")
384
+ def delta_rebuild_interval(self) -> Optional[pulumi.Input[_builtins.str]]:
385
+ """
386
+ Interval to check for new revocations on, to regenerate the delta CRL.
387
+ """
388
+ return pulumi.get(self, "delta_rebuild_interval")
389
+
390
+ @delta_rebuild_interval.setter
391
+ def delta_rebuild_interval(self, value: Optional[pulumi.Input[_builtins.str]]):
392
+ pulumi.set(self, "delta_rebuild_interval", value)
393
+
394
+ @_builtins.property
395
+ @pulumi.getter
396
+ def disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
397
+ """
398
+ Disables or enables CRL building.
399
+ """
400
+ return pulumi.get(self, "disable")
401
+
402
+ @disable.setter
403
+ def disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
404
+ pulumi.set(self, "disable", value)
405
+
406
+ @_builtins.property
407
+ @pulumi.getter(name="enableDelta")
408
+ def enable_delta(self) -> Optional[pulumi.Input[_builtins.bool]]:
409
+ """
410
+ Enables building of delta CRLs with up-to-date revocation information,
411
+ augmenting the last complete CRL. **Vault 1.12+**
412
+ """
413
+ return pulumi.get(self, "enable_delta")
414
+
415
+ @enable_delta.setter
416
+ def enable_delta(self, value: Optional[pulumi.Input[_builtins.bool]]):
417
+ pulumi.set(self, "enable_delta", value)
418
+
419
+ @_builtins.property
420
+ @pulumi.getter
421
+ def expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
422
+ """
423
+ Specifies the time until expiration.
424
+ """
425
+ return pulumi.get(self, "expiry")
426
+
427
+ @expiry.setter
428
+ def expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
429
+ pulumi.set(self, "expiry", value)
430
+
431
+ @_builtins.property
432
+ @pulumi.getter(name="maxCrlEntries")
433
+ def max_crl_entries(self) -> Optional[pulumi.Input[_builtins.int]]:
434
+ """
435
+ The maximum number of entries a CRL can contain. This option exists to prevent
436
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
437
+ """
438
+ return pulumi.get(self, "max_crl_entries")
439
+
440
+ @max_crl_entries.setter
441
+ def max_crl_entries(self, value: Optional[pulumi.Input[_builtins.int]]):
442
+ pulumi.set(self, "max_crl_entries", value)
443
+
444
+ @_builtins.property
445
+ @pulumi.getter
446
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
447
+ """
448
+ The namespace to provision the resource in.
449
+ The value should not contain leading or trailing forward slashes.
450
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
451
+ *Available only for Vault Enterprise*.
452
+ """
453
+ return pulumi.get(self, "namespace")
454
+
455
+ @namespace.setter
456
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
457
+ pulumi.set(self, "namespace", value)
458
+
459
+ @_builtins.property
460
+ @pulumi.getter(name="ocspDisable")
461
+ def ocsp_disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
462
+ """
463
+ Disables the OCSP responder in Vault. **Vault 1.12+**
464
+ """
465
+ return pulumi.get(self, "ocsp_disable")
466
+
467
+ @ocsp_disable.setter
468
+ def ocsp_disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
469
+ pulumi.set(self, "ocsp_disable", value)
470
+
471
+ @_builtins.property
472
+ @pulumi.getter(name="ocspExpiry")
473
+ def ocsp_expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
474
+ """
475
+ The amount of time an OCSP response can be cached for, useful for OCSP stapling
476
+ refresh durations. **Vault 1.12+**
477
+ """
478
+ return pulumi.get(self, "ocsp_expiry")
479
+
480
+ @ocsp_expiry.setter
481
+ def ocsp_expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
482
+ pulumi.set(self, "ocsp_expiry", value)
483
+
484
+ @_builtins.property
485
+ @pulumi.getter(name="unifiedCrl")
486
+ def unified_crl(self) -> Optional[pulumi.Input[_builtins.bool]]:
487
+ """
488
+ Enables unified CRL and OCSP building. **Vault 1.13+**
489
+ """
490
+ return pulumi.get(self, "unified_crl")
491
+
492
+ @unified_crl.setter
493
+ def unified_crl(self, value: Optional[pulumi.Input[_builtins.bool]]):
494
+ pulumi.set(self, "unified_crl", value)
495
+
496
+ @_builtins.property
497
+ @pulumi.getter(name="unifiedCrlOnExistingPaths")
498
+ def unified_crl_on_existing_paths(self) -> Optional[pulumi.Input[_builtins.bool]]:
499
+ """
500
+ Enables serving the unified CRL and OCSP on the existing, previously
501
+ cluster-local paths. **Vault 1.13+**
502
+ """
503
+ return pulumi.get(self, "unified_crl_on_existing_paths")
504
+
505
+ @unified_crl_on_existing_paths.setter
506
+ def unified_crl_on_existing_paths(self, value: Optional[pulumi.Input[_builtins.bool]]):
507
+ pulumi.set(self, "unified_crl_on_existing_paths", value)
508
+
509
+
510
+ @pulumi.type_token("vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig")
511
+ class SecretBackendCrlConfig(pulumi.CustomResource):
512
+ @overload
513
+ def __init__(__self__,
514
+ resource_name: str,
515
+ opts: Optional[pulumi.ResourceOptions] = None,
516
+ auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
517
+ auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
518
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
519
+ cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
520
+ delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
521
+ disable: Optional[pulumi.Input[_builtins.bool]] = None,
522
+ enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
523
+ expiry: Optional[pulumi.Input[_builtins.str]] = None,
524
+ max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
525
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
526
+ ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
527
+ ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
528
+ unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
529
+ unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None,
530
+ __props__=None):
531
+ """
532
+ Allows setting the duration for which the generated CRL should be marked valid. If the CRL is disabled, it will return a signed but zero-length CRL for any request. If enabled, it will re-build the CRL.
533
+
534
+ ## Example Usage
535
+
536
+ ```python
537
+ import pulumi
538
+ import pulumi_vault as vault
539
+
540
+ pki = vault.Mount("pki",
541
+ path="%s",
542
+ type="pki",
543
+ default_lease_ttl_seconds=3600,
544
+ max_lease_ttl_seconds=86400)
545
+ crl_config = vault.pkisecret.SecretBackendCrlConfig("crl_config",
546
+ backend=pki.path,
547
+ expiry="72h",
548
+ disable=False)
549
+ ```
550
+
551
+ :param str resource_name: The name of the resource.
552
+ :param pulumi.ResourceOptions opts: Options for the resource.
553
+ :param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
554
+ :param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
555
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
556
+ :param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
557
+ :param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
558
+ :param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
559
+ :param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
560
+ augmenting the last complete CRL. **Vault 1.12+**
561
+ :param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
562
+ :param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
563
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
564
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
565
+ The value should not contain leading or trailing forward slashes.
566
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
567
+ *Available only for Vault Enterprise*.
568
+ :param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
569
+ :param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
570
+ refresh durations. **Vault 1.12+**
571
+ :param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
572
+ :param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
573
+ cluster-local paths. **Vault 1.13+**
574
+ """
575
+ ...
576
+ @overload
577
+ def __init__(__self__,
578
+ resource_name: str,
579
+ args: SecretBackendCrlConfigArgs,
580
+ opts: Optional[pulumi.ResourceOptions] = None):
581
+ """
582
+ Allows setting the duration for which the generated CRL should be marked valid. If the CRL is disabled, it will return a signed but zero-length CRL for any request. If enabled, it will re-build the CRL.
583
+
584
+ ## Example Usage
585
+
586
+ ```python
587
+ import pulumi
588
+ import pulumi_vault as vault
589
+
590
+ pki = vault.Mount("pki",
591
+ path="%s",
592
+ type="pki",
593
+ default_lease_ttl_seconds=3600,
594
+ max_lease_ttl_seconds=86400)
595
+ crl_config = vault.pkisecret.SecretBackendCrlConfig("crl_config",
596
+ backend=pki.path,
597
+ expiry="72h",
598
+ disable=False)
599
+ ```
600
+
601
+ :param str resource_name: The name of the resource.
602
+ :param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
603
+ :param pulumi.ResourceOptions opts: Options for the resource.
604
+ """
605
+ ...
606
+ def __init__(__self__, resource_name: str, *args, **kwargs):
607
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendCrlConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
608
+ if resource_args is not None:
609
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
610
+ else:
611
+ __self__._internal_init(resource_name, *args, **kwargs)
612
+
613
+ def _internal_init(__self__,
614
+ resource_name: str,
615
+ opts: Optional[pulumi.ResourceOptions] = None,
616
+ auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
617
+ auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
618
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
619
+ cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
620
+ delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
621
+ disable: Optional[pulumi.Input[_builtins.bool]] = None,
622
+ enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
623
+ expiry: Optional[pulumi.Input[_builtins.str]] = None,
624
+ max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
625
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
626
+ ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
627
+ ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
628
+ unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
629
+ unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None,
630
+ __props__=None):
631
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
632
+ if not isinstance(opts, pulumi.ResourceOptions):
633
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
634
+ if opts.id is None:
635
+ if __props__ is not None:
636
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
637
+ __props__ = SecretBackendCrlConfigArgs.__new__(SecretBackendCrlConfigArgs)
638
+
639
+ __props__.__dict__["auto_rebuild"] = auto_rebuild
640
+ __props__.__dict__["auto_rebuild_grace_period"] = auto_rebuild_grace_period
641
+ if backend is None and not opts.urn:
642
+ raise TypeError("Missing required property 'backend'")
643
+ __props__.__dict__["backend"] = backend
644
+ __props__.__dict__["cross_cluster_revocation"] = cross_cluster_revocation
645
+ __props__.__dict__["delta_rebuild_interval"] = delta_rebuild_interval
646
+ __props__.__dict__["disable"] = disable
647
+ __props__.__dict__["enable_delta"] = enable_delta
648
+ __props__.__dict__["expiry"] = expiry
649
+ __props__.__dict__["max_crl_entries"] = max_crl_entries
650
+ __props__.__dict__["namespace"] = namespace
651
+ __props__.__dict__["ocsp_disable"] = ocsp_disable
652
+ __props__.__dict__["ocsp_expiry"] = ocsp_expiry
653
+ __props__.__dict__["unified_crl"] = unified_crl
654
+ __props__.__dict__["unified_crl_on_existing_paths"] = unified_crl_on_existing_paths
655
+ super(SecretBackendCrlConfig, __self__).__init__(
656
+ 'vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig',
657
+ resource_name,
658
+ __props__,
659
+ opts)
660
+
661
+ @staticmethod
662
+ def get(resource_name: str,
663
+ id: pulumi.Input[str],
664
+ opts: Optional[pulumi.ResourceOptions] = None,
665
+ auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
666
+ auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
667
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
668
+ cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
669
+ delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
670
+ disable: Optional[pulumi.Input[_builtins.bool]] = None,
671
+ enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
672
+ expiry: Optional[pulumi.Input[_builtins.str]] = None,
673
+ max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
674
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
675
+ ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
676
+ ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
677
+ unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
678
+ unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackendCrlConfig':
679
+ """
680
+ Get an existing SecretBackendCrlConfig resource's state with the given name, id, and optional extra
681
+ properties used to qualify the lookup.
682
+
683
+ :param str resource_name: The unique name of the resulting resource.
684
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
685
+ :param pulumi.ResourceOptions opts: Options for the resource.
686
+ :param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
687
+ :param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
688
+ :param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
689
+ :param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
690
+ :param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
691
+ :param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
692
+ :param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
693
+ augmenting the last complete CRL. **Vault 1.12+**
694
+ :param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
695
+ :param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
696
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
697
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
698
+ The value should not contain leading or trailing forward slashes.
699
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
700
+ *Available only for Vault Enterprise*.
701
+ :param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
702
+ :param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
703
+ refresh durations. **Vault 1.12+**
704
+ :param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
705
+ :param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
706
+ cluster-local paths. **Vault 1.13+**
707
+ """
708
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
709
+
710
+ __props__ = _SecretBackendCrlConfigState.__new__(_SecretBackendCrlConfigState)
711
+
712
+ __props__.__dict__["auto_rebuild"] = auto_rebuild
713
+ __props__.__dict__["auto_rebuild_grace_period"] = auto_rebuild_grace_period
714
+ __props__.__dict__["backend"] = backend
715
+ __props__.__dict__["cross_cluster_revocation"] = cross_cluster_revocation
716
+ __props__.__dict__["delta_rebuild_interval"] = delta_rebuild_interval
717
+ __props__.__dict__["disable"] = disable
718
+ __props__.__dict__["enable_delta"] = enable_delta
719
+ __props__.__dict__["expiry"] = expiry
720
+ __props__.__dict__["max_crl_entries"] = max_crl_entries
721
+ __props__.__dict__["namespace"] = namespace
722
+ __props__.__dict__["ocsp_disable"] = ocsp_disable
723
+ __props__.__dict__["ocsp_expiry"] = ocsp_expiry
724
+ __props__.__dict__["unified_crl"] = unified_crl
725
+ __props__.__dict__["unified_crl_on_existing_paths"] = unified_crl_on_existing_paths
726
+ return SecretBackendCrlConfig(resource_name, opts=opts, __props__=__props__)
727
+
728
+ @_builtins.property
729
+ @pulumi.getter(name="autoRebuild")
730
+ def auto_rebuild(self) -> pulumi.Output[Optional[_builtins.bool]]:
731
+ """
732
+ Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
733
+ """
734
+ return pulumi.get(self, "auto_rebuild")
735
+
736
+ @_builtins.property
737
+ @pulumi.getter(name="autoRebuildGracePeriod")
738
+ def auto_rebuild_grace_period(self) -> pulumi.Output[_builtins.str]:
739
+ """
740
+ Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
741
+ """
742
+ return pulumi.get(self, "auto_rebuild_grace_period")
743
+
744
+ @_builtins.property
745
+ @pulumi.getter
746
+ def backend(self) -> pulumi.Output[_builtins.str]:
747
+ """
748
+ The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
749
+ """
750
+ return pulumi.get(self, "backend")
751
+
752
+ @_builtins.property
753
+ @pulumi.getter(name="crossClusterRevocation")
754
+ def cross_cluster_revocation(self) -> pulumi.Output[_builtins.bool]:
755
+ """
756
+ Enable cross-cluster revocation request queues. **Vault 1.13+**
757
+ """
758
+ return pulumi.get(self, "cross_cluster_revocation")
759
+
760
+ @_builtins.property
761
+ @pulumi.getter(name="deltaRebuildInterval")
762
+ def delta_rebuild_interval(self) -> pulumi.Output[_builtins.str]:
763
+ """
764
+ Interval to check for new revocations on, to regenerate the delta CRL.
765
+ """
766
+ return pulumi.get(self, "delta_rebuild_interval")
767
+
768
+ @_builtins.property
769
+ @pulumi.getter
770
+ def disable(self) -> pulumi.Output[Optional[_builtins.bool]]:
771
+ """
772
+ Disables or enables CRL building.
773
+ """
774
+ return pulumi.get(self, "disable")
775
+
776
+ @_builtins.property
777
+ @pulumi.getter(name="enableDelta")
778
+ def enable_delta(self) -> pulumi.Output[Optional[_builtins.bool]]:
779
+ """
780
+ Enables building of delta CRLs with up-to-date revocation information,
781
+ augmenting the last complete CRL. **Vault 1.12+**
782
+ """
783
+ return pulumi.get(self, "enable_delta")
784
+
785
+ @_builtins.property
786
+ @pulumi.getter
787
+ def expiry(self) -> pulumi.Output[Optional[_builtins.str]]:
788
+ """
789
+ Specifies the time until expiration.
790
+ """
791
+ return pulumi.get(self, "expiry")
792
+
793
+ @_builtins.property
794
+ @pulumi.getter(name="maxCrlEntries")
795
+ def max_crl_entries(self) -> pulumi.Output[_builtins.int]:
796
+ """
797
+ The maximum number of entries a CRL can contain. This option exists to prevent
798
+ accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
799
+ """
800
+ return pulumi.get(self, "max_crl_entries")
801
+
802
+ @_builtins.property
803
+ @pulumi.getter
804
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
805
+ """
806
+ The namespace to provision the resource in.
807
+ The value should not contain leading or trailing forward slashes.
808
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
809
+ *Available only for Vault Enterprise*.
810
+ """
811
+ return pulumi.get(self, "namespace")
812
+
813
+ @_builtins.property
814
+ @pulumi.getter(name="ocspDisable")
815
+ def ocsp_disable(self) -> pulumi.Output[Optional[_builtins.bool]]:
816
+ """
817
+ Disables the OCSP responder in Vault. **Vault 1.12+**
818
+ """
819
+ return pulumi.get(self, "ocsp_disable")
820
+
821
+ @_builtins.property
822
+ @pulumi.getter(name="ocspExpiry")
823
+ def ocsp_expiry(self) -> pulumi.Output[_builtins.str]:
824
+ """
825
+ The amount of time an OCSP response can be cached for, useful for OCSP stapling
826
+ refresh durations. **Vault 1.12+**
827
+ """
828
+ return pulumi.get(self, "ocsp_expiry")
829
+
830
+ @_builtins.property
831
+ @pulumi.getter(name="unifiedCrl")
832
+ def unified_crl(self) -> pulumi.Output[_builtins.bool]:
833
+ """
834
+ Enables unified CRL and OCSP building. **Vault 1.13+**
835
+ """
836
+ return pulumi.get(self, "unified_crl")
837
+
838
+ @_builtins.property
839
+ @pulumi.getter(name="unifiedCrlOnExistingPaths")
840
+ def unified_crl_on_existing_paths(self) -> pulumi.Output[_builtins.bool]:
841
+ """
842
+ Enables serving the unified CRL and OCSP on the existing, previously
843
+ cluster-local paths. **Vault 1.13+**
844
+ """
845
+ return pulumi.get(self, "unified_crl_on_existing_paths")
846
+