pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,846 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['SecretBackendCrlConfigArgs', 'SecretBackendCrlConfig']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class SecretBackendCrlConfigArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
|
23
|
+
auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
24
|
+
auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
28
|
+
enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
29
|
+
expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
33
|
+
ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
35
|
+
unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
36
|
+
"""
|
|
37
|
+
The set of arguments for constructing a SecretBackendCrlConfig resource.
|
|
38
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
39
|
+
:param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
40
|
+
:param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
41
|
+
:param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
42
|
+
:param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
|
|
43
|
+
:param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
|
|
44
|
+
:param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
|
|
45
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
46
|
+
:param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
|
|
47
|
+
:param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
|
|
48
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
49
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
50
|
+
The value should not contain leading or trailing forward slashes.
|
|
51
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
52
|
+
*Available only for Vault Enterprise*.
|
|
53
|
+
:param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
54
|
+
:param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
55
|
+
refresh durations. **Vault 1.12+**
|
|
56
|
+
:param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
57
|
+
:param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
|
|
58
|
+
cluster-local paths. **Vault 1.13+**
|
|
59
|
+
"""
|
|
60
|
+
pulumi.set(__self__, "backend", backend)
|
|
61
|
+
if auto_rebuild is not None:
|
|
62
|
+
pulumi.set(__self__, "auto_rebuild", auto_rebuild)
|
|
63
|
+
if auto_rebuild_grace_period is not None:
|
|
64
|
+
pulumi.set(__self__, "auto_rebuild_grace_period", auto_rebuild_grace_period)
|
|
65
|
+
if cross_cluster_revocation is not None:
|
|
66
|
+
pulumi.set(__self__, "cross_cluster_revocation", cross_cluster_revocation)
|
|
67
|
+
if delta_rebuild_interval is not None:
|
|
68
|
+
pulumi.set(__self__, "delta_rebuild_interval", delta_rebuild_interval)
|
|
69
|
+
if disable is not None:
|
|
70
|
+
pulumi.set(__self__, "disable", disable)
|
|
71
|
+
if enable_delta is not None:
|
|
72
|
+
pulumi.set(__self__, "enable_delta", enable_delta)
|
|
73
|
+
if expiry is not None:
|
|
74
|
+
pulumi.set(__self__, "expiry", expiry)
|
|
75
|
+
if max_crl_entries is not None:
|
|
76
|
+
pulumi.set(__self__, "max_crl_entries", max_crl_entries)
|
|
77
|
+
if namespace is not None:
|
|
78
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
79
|
+
if ocsp_disable is not None:
|
|
80
|
+
pulumi.set(__self__, "ocsp_disable", ocsp_disable)
|
|
81
|
+
if ocsp_expiry is not None:
|
|
82
|
+
pulumi.set(__self__, "ocsp_expiry", ocsp_expiry)
|
|
83
|
+
if unified_crl is not None:
|
|
84
|
+
pulumi.set(__self__, "unified_crl", unified_crl)
|
|
85
|
+
if unified_crl_on_existing_paths is not None:
|
|
86
|
+
pulumi.set(__self__, "unified_crl_on_existing_paths", unified_crl_on_existing_paths)
|
|
87
|
+
|
|
88
|
+
@_builtins.property
|
|
89
|
+
@pulumi.getter
|
|
90
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
|
91
|
+
"""
|
|
92
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
93
|
+
"""
|
|
94
|
+
return pulumi.get(self, "backend")
|
|
95
|
+
|
|
96
|
+
@backend.setter
|
|
97
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
|
98
|
+
pulumi.set(self, "backend", value)
|
|
99
|
+
|
|
100
|
+
@_builtins.property
|
|
101
|
+
@pulumi.getter(name="autoRebuild")
|
|
102
|
+
def auto_rebuild(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
103
|
+
"""
|
|
104
|
+
Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
105
|
+
"""
|
|
106
|
+
return pulumi.get(self, "auto_rebuild")
|
|
107
|
+
|
|
108
|
+
@auto_rebuild.setter
|
|
109
|
+
def auto_rebuild(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
110
|
+
pulumi.set(self, "auto_rebuild", value)
|
|
111
|
+
|
|
112
|
+
@_builtins.property
|
|
113
|
+
@pulumi.getter(name="autoRebuildGracePeriod")
|
|
114
|
+
def auto_rebuild_grace_period(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
115
|
+
"""
|
|
116
|
+
Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
117
|
+
"""
|
|
118
|
+
return pulumi.get(self, "auto_rebuild_grace_period")
|
|
119
|
+
|
|
120
|
+
@auto_rebuild_grace_period.setter
|
|
121
|
+
def auto_rebuild_grace_period(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
122
|
+
pulumi.set(self, "auto_rebuild_grace_period", value)
|
|
123
|
+
|
|
124
|
+
@_builtins.property
|
|
125
|
+
@pulumi.getter(name="crossClusterRevocation")
|
|
126
|
+
def cross_cluster_revocation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
127
|
+
"""
|
|
128
|
+
Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
129
|
+
"""
|
|
130
|
+
return pulumi.get(self, "cross_cluster_revocation")
|
|
131
|
+
|
|
132
|
+
@cross_cluster_revocation.setter
|
|
133
|
+
def cross_cluster_revocation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
134
|
+
pulumi.set(self, "cross_cluster_revocation", value)
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter(name="deltaRebuildInterval")
|
|
138
|
+
def delta_rebuild_interval(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
139
|
+
"""
|
|
140
|
+
Interval to check for new revocations on, to regenerate the delta CRL.
|
|
141
|
+
"""
|
|
142
|
+
return pulumi.get(self, "delta_rebuild_interval")
|
|
143
|
+
|
|
144
|
+
@delta_rebuild_interval.setter
|
|
145
|
+
def delta_rebuild_interval(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
146
|
+
pulumi.set(self, "delta_rebuild_interval", value)
|
|
147
|
+
|
|
148
|
+
@_builtins.property
|
|
149
|
+
@pulumi.getter
|
|
150
|
+
def disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
151
|
+
"""
|
|
152
|
+
Disables or enables CRL building.
|
|
153
|
+
"""
|
|
154
|
+
return pulumi.get(self, "disable")
|
|
155
|
+
|
|
156
|
+
@disable.setter
|
|
157
|
+
def disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
158
|
+
pulumi.set(self, "disable", value)
|
|
159
|
+
|
|
160
|
+
@_builtins.property
|
|
161
|
+
@pulumi.getter(name="enableDelta")
|
|
162
|
+
def enable_delta(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
163
|
+
"""
|
|
164
|
+
Enables building of delta CRLs with up-to-date revocation information,
|
|
165
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
166
|
+
"""
|
|
167
|
+
return pulumi.get(self, "enable_delta")
|
|
168
|
+
|
|
169
|
+
@enable_delta.setter
|
|
170
|
+
def enable_delta(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
171
|
+
pulumi.set(self, "enable_delta", value)
|
|
172
|
+
|
|
173
|
+
@_builtins.property
|
|
174
|
+
@pulumi.getter
|
|
175
|
+
def expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
176
|
+
"""
|
|
177
|
+
Specifies the time until expiration.
|
|
178
|
+
"""
|
|
179
|
+
return pulumi.get(self, "expiry")
|
|
180
|
+
|
|
181
|
+
@expiry.setter
|
|
182
|
+
def expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
183
|
+
pulumi.set(self, "expiry", value)
|
|
184
|
+
|
|
185
|
+
@_builtins.property
|
|
186
|
+
@pulumi.getter(name="maxCrlEntries")
|
|
187
|
+
def max_crl_entries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
188
|
+
"""
|
|
189
|
+
The maximum number of entries a CRL can contain. This option exists to prevent
|
|
190
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
191
|
+
"""
|
|
192
|
+
return pulumi.get(self, "max_crl_entries")
|
|
193
|
+
|
|
194
|
+
@max_crl_entries.setter
|
|
195
|
+
def max_crl_entries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
196
|
+
pulumi.set(self, "max_crl_entries", value)
|
|
197
|
+
|
|
198
|
+
@_builtins.property
|
|
199
|
+
@pulumi.getter
|
|
200
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
201
|
+
"""
|
|
202
|
+
The namespace to provision the resource in.
|
|
203
|
+
The value should not contain leading or trailing forward slashes.
|
|
204
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
205
|
+
*Available only for Vault Enterprise*.
|
|
206
|
+
"""
|
|
207
|
+
return pulumi.get(self, "namespace")
|
|
208
|
+
|
|
209
|
+
@namespace.setter
|
|
210
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
211
|
+
pulumi.set(self, "namespace", value)
|
|
212
|
+
|
|
213
|
+
@_builtins.property
|
|
214
|
+
@pulumi.getter(name="ocspDisable")
|
|
215
|
+
def ocsp_disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
216
|
+
"""
|
|
217
|
+
Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
218
|
+
"""
|
|
219
|
+
return pulumi.get(self, "ocsp_disable")
|
|
220
|
+
|
|
221
|
+
@ocsp_disable.setter
|
|
222
|
+
def ocsp_disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
223
|
+
pulumi.set(self, "ocsp_disable", value)
|
|
224
|
+
|
|
225
|
+
@_builtins.property
|
|
226
|
+
@pulumi.getter(name="ocspExpiry")
|
|
227
|
+
def ocsp_expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
228
|
+
"""
|
|
229
|
+
The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
230
|
+
refresh durations. **Vault 1.12+**
|
|
231
|
+
"""
|
|
232
|
+
return pulumi.get(self, "ocsp_expiry")
|
|
233
|
+
|
|
234
|
+
@ocsp_expiry.setter
|
|
235
|
+
def ocsp_expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
236
|
+
pulumi.set(self, "ocsp_expiry", value)
|
|
237
|
+
|
|
238
|
+
@_builtins.property
|
|
239
|
+
@pulumi.getter(name="unifiedCrl")
|
|
240
|
+
def unified_crl(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
241
|
+
"""
|
|
242
|
+
Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
243
|
+
"""
|
|
244
|
+
return pulumi.get(self, "unified_crl")
|
|
245
|
+
|
|
246
|
+
@unified_crl.setter
|
|
247
|
+
def unified_crl(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
248
|
+
pulumi.set(self, "unified_crl", value)
|
|
249
|
+
|
|
250
|
+
@_builtins.property
|
|
251
|
+
@pulumi.getter(name="unifiedCrlOnExistingPaths")
|
|
252
|
+
def unified_crl_on_existing_paths(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
253
|
+
"""
|
|
254
|
+
Enables serving the unified CRL and OCSP on the existing, previously
|
|
255
|
+
cluster-local paths. **Vault 1.13+**
|
|
256
|
+
"""
|
|
257
|
+
return pulumi.get(self, "unified_crl_on_existing_paths")
|
|
258
|
+
|
|
259
|
+
@unified_crl_on_existing_paths.setter
|
|
260
|
+
def unified_crl_on_existing_paths(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
261
|
+
pulumi.set(self, "unified_crl_on_existing_paths", value)
|
|
262
|
+
|
|
263
|
+
|
|
264
|
+
@pulumi.input_type
|
|
265
|
+
class _SecretBackendCrlConfigState:
|
|
266
|
+
def __init__(__self__, *,
|
|
267
|
+
auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
268
|
+
auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
|
|
269
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
270
|
+
cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
271
|
+
delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
|
|
272
|
+
disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
273
|
+
enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
274
|
+
expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
275
|
+
max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
276
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
277
|
+
ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
278
|
+
ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
279
|
+
unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
280
|
+
unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
281
|
+
"""
|
|
282
|
+
Input properties used for looking up and filtering SecretBackendCrlConfig resources.
|
|
283
|
+
:param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
284
|
+
:param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
285
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
286
|
+
:param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
287
|
+
:param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
|
|
288
|
+
:param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
|
|
289
|
+
:param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
|
|
290
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
291
|
+
:param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
|
|
292
|
+
:param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
|
|
293
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
294
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
295
|
+
The value should not contain leading or trailing forward slashes.
|
|
296
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
297
|
+
*Available only for Vault Enterprise*.
|
|
298
|
+
:param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
299
|
+
:param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
300
|
+
refresh durations. **Vault 1.12+**
|
|
301
|
+
:param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
302
|
+
:param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
|
|
303
|
+
cluster-local paths. **Vault 1.13+**
|
|
304
|
+
"""
|
|
305
|
+
if auto_rebuild is not None:
|
|
306
|
+
pulumi.set(__self__, "auto_rebuild", auto_rebuild)
|
|
307
|
+
if auto_rebuild_grace_period is not None:
|
|
308
|
+
pulumi.set(__self__, "auto_rebuild_grace_period", auto_rebuild_grace_period)
|
|
309
|
+
if backend is not None:
|
|
310
|
+
pulumi.set(__self__, "backend", backend)
|
|
311
|
+
if cross_cluster_revocation is not None:
|
|
312
|
+
pulumi.set(__self__, "cross_cluster_revocation", cross_cluster_revocation)
|
|
313
|
+
if delta_rebuild_interval is not None:
|
|
314
|
+
pulumi.set(__self__, "delta_rebuild_interval", delta_rebuild_interval)
|
|
315
|
+
if disable is not None:
|
|
316
|
+
pulumi.set(__self__, "disable", disable)
|
|
317
|
+
if enable_delta is not None:
|
|
318
|
+
pulumi.set(__self__, "enable_delta", enable_delta)
|
|
319
|
+
if expiry is not None:
|
|
320
|
+
pulumi.set(__self__, "expiry", expiry)
|
|
321
|
+
if max_crl_entries is not None:
|
|
322
|
+
pulumi.set(__self__, "max_crl_entries", max_crl_entries)
|
|
323
|
+
if namespace is not None:
|
|
324
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
325
|
+
if ocsp_disable is not None:
|
|
326
|
+
pulumi.set(__self__, "ocsp_disable", ocsp_disable)
|
|
327
|
+
if ocsp_expiry is not None:
|
|
328
|
+
pulumi.set(__self__, "ocsp_expiry", ocsp_expiry)
|
|
329
|
+
if unified_crl is not None:
|
|
330
|
+
pulumi.set(__self__, "unified_crl", unified_crl)
|
|
331
|
+
if unified_crl_on_existing_paths is not None:
|
|
332
|
+
pulumi.set(__self__, "unified_crl_on_existing_paths", unified_crl_on_existing_paths)
|
|
333
|
+
|
|
334
|
+
@_builtins.property
|
|
335
|
+
@pulumi.getter(name="autoRebuild")
|
|
336
|
+
def auto_rebuild(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
337
|
+
"""
|
|
338
|
+
Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
339
|
+
"""
|
|
340
|
+
return pulumi.get(self, "auto_rebuild")
|
|
341
|
+
|
|
342
|
+
@auto_rebuild.setter
|
|
343
|
+
def auto_rebuild(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
344
|
+
pulumi.set(self, "auto_rebuild", value)
|
|
345
|
+
|
|
346
|
+
@_builtins.property
|
|
347
|
+
@pulumi.getter(name="autoRebuildGracePeriod")
|
|
348
|
+
def auto_rebuild_grace_period(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
349
|
+
"""
|
|
350
|
+
Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
351
|
+
"""
|
|
352
|
+
return pulumi.get(self, "auto_rebuild_grace_period")
|
|
353
|
+
|
|
354
|
+
@auto_rebuild_grace_period.setter
|
|
355
|
+
def auto_rebuild_grace_period(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
356
|
+
pulumi.set(self, "auto_rebuild_grace_period", value)
|
|
357
|
+
|
|
358
|
+
@_builtins.property
|
|
359
|
+
@pulumi.getter
|
|
360
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
361
|
+
"""
|
|
362
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
363
|
+
"""
|
|
364
|
+
return pulumi.get(self, "backend")
|
|
365
|
+
|
|
366
|
+
@backend.setter
|
|
367
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
368
|
+
pulumi.set(self, "backend", value)
|
|
369
|
+
|
|
370
|
+
@_builtins.property
|
|
371
|
+
@pulumi.getter(name="crossClusterRevocation")
|
|
372
|
+
def cross_cluster_revocation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
373
|
+
"""
|
|
374
|
+
Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
375
|
+
"""
|
|
376
|
+
return pulumi.get(self, "cross_cluster_revocation")
|
|
377
|
+
|
|
378
|
+
@cross_cluster_revocation.setter
|
|
379
|
+
def cross_cluster_revocation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
380
|
+
pulumi.set(self, "cross_cluster_revocation", value)
|
|
381
|
+
|
|
382
|
+
@_builtins.property
|
|
383
|
+
@pulumi.getter(name="deltaRebuildInterval")
|
|
384
|
+
def delta_rebuild_interval(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
385
|
+
"""
|
|
386
|
+
Interval to check for new revocations on, to regenerate the delta CRL.
|
|
387
|
+
"""
|
|
388
|
+
return pulumi.get(self, "delta_rebuild_interval")
|
|
389
|
+
|
|
390
|
+
@delta_rebuild_interval.setter
|
|
391
|
+
def delta_rebuild_interval(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
392
|
+
pulumi.set(self, "delta_rebuild_interval", value)
|
|
393
|
+
|
|
394
|
+
@_builtins.property
|
|
395
|
+
@pulumi.getter
|
|
396
|
+
def disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
397
|
+
"""
|
|
398
|
+
Disables or enables CRL building.
|
|
399
|
+
"""
|
|
400
|
+
return pulumi.get(self, "disable")
|
|
401
|
+
|
|
402
|
+
@disable.setter
|
|
403
|
+
def disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
404
|
+
pulumi.set(self, "disable", value)
|
|
405
|
+
|
|
406
|
+
@_builtins.property
|
|
407
|
+
@pulumi.getter(name="enableDelta")
|
|
408
|
+
def enable_delta(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
409
|
+
"""
|
|
410
|
+
Enables building of delta CRLs with up-to-date revocation information,
|
|
411
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
412
|
+
"""
|
|
413
|
+
return pulumi.get(self, "enable_delta")
|
|
414
|
+
|
|
415
|
+
@enable_delta.setter
|
|
416
|
+
def enable_delta(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
417
|
+
pulumi.set(self, "enable_delta", value)
|
|
418
|
+
|
|
419
|
+
@_builtins.property
|
|
420
|
+
@pulumi.getter
|
|
421
|
+
def expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
422
|
+
"""
|
|
423
|
+
Specifies the time until expiration.
|
|
424
|
+
"""
|
|
425
|
+
return pulumi.get(self, "expiry")
|
|
426
|
+
|
|
427
|
+
@expiry.setter
|
|
428
|
+
def expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
429
|
+
pulumi.set(self, "expiry", value)
|
|
430
|
+
|
|
431
|
+
@_builtins.property
|
|
432
|
+
@pulumi.getter(name="maxCrlEntries")
|
|
433
|
+
def max_crl_entries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
434
|
+
"""
|
|
435
|
+
The maximum number of entries a CRL can contain. This option exists to prevent
|
|
436
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
437
|
+
"""
|
|
438
|
+
return pulumi.get(self, "max_crl_entries")
|
|
439
|
+
|
|
440
|
+
@max_crl_entries.setter
|
|
441
|
+
def max_crl_entries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
442
|
+
pulumi.set(self, "max_crl_entries", value)
|
|
443
|
+
|
|
444
|
+
@_builtins.property
|
|
445
|
+
@pulumi.getter
|
|
446
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
447
|
+
"""
|
|
448
|
+
The namespace to provision the resource in.
|
|
449
|
+
The value should not contain leading or trailing forward slashes.
|
|
450
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
451
|
+
*Available only for Vault Enterprise*.
|
|
452
|
+
"""
|
|
453
|
+
return pulumi.get(self, "namespace")
|
|
454
|
+
|
|
455
|
+
@namespace.setter
|
|
456
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
457
|
+
pulumi.set(self, "namespace", value)
|
|
458
|
+
|
|
459
|
+
@_builtins.property
|
|
460
|
+
@pulumi.getter(name="ocspDisable")
|
|
461
|
+
def ocsp_disable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
462
|
+
"""
|
|
463
|
+
Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
464
|
+
"""
|
|
465
|
+
return pulumi.get(self, "ocsp_disable")
|
|
466
|
+
|
|
467
|
+
@ocsp_disable.setter
|
|
468
|
+
def ocsp_disable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
469
|
+
pulumi.set(self, "ocsp_disable", value)
|
|
470
|
+
|
|
471
|
+
@_builtins.property
|
|
472
|
+
@pulumi.getter(name="ocspExpiry")
|
|
473
|
+
def ocsp_expiry(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
474
|
+
"""
|
|
475
|
+
The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
476
|
+
refresh durations. **Vault 1.12+**
|
|
477
|
+
"""
|
|
478
|
+
return pulumi.get(self, "ocsp_expiry")
|
|
479
|
+
|
|
480
|
+
@ocsp_expiry.setter
|
|
481
|
+
def ocsp_expiry(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
482
|
+
pulumi.set(self, "ocsp_expiry", value)
|
|
483
|
+
|
|
484
|
+
@_builtins.property
|
|
485
|
+
@pulumi.getter(name="unifiedCrl")
|
|
486
|
+
def unified_crl(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
487
|
+
"""
|
|
488
|
+
Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
489
|
+
"""
|
|
490
|
+
return pulumi.get(self, "unified_crl")
|
|
491
|
+
|
|
492
|
+
@unified_crl.setter
|
|
493
|
+
def unified_crl(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
494
|
+
pulumi.set(self, "unified_crl", value)
|
|
495
|
+
|
|
496
|
+
@_builtins.property
|
|
497
|
+
@pulumi.getter(name="unifiedCrlOnExistingPaths")
|
|
498
|
+
def unified_crl_on_existing_paths(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
499
|
+
"""
|
|
500
|
+
Enables serving the unified CRL and OCSP on the existing, previously
|
|
501
|
+
cluster-local paths. **Vault 1.13+**
|
|
502
|
+
"""
|
|
503
|
+
return pulumi.get(self, "unified_crl_on_existing_paths")
|
|
504
|
+
|
|
505
|
+
@unified_crl_on_existing_paths.setter
|
|
506
|
+
def unified_crl_on_existing_paths(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
507
|
+
pulumi.set(self, "unified_crl_on_existing_paths", value)
|
|
508
|
+
|
|
509
|
+
|
|
510
|
+
@pulumi.type_token("vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig")
|
|
511
|
+
class SecretBackendCrlConfig(pulumi.CustomResource):
|
|
512
|
+
@overload
|
|
513
|
+
def __init__(__self__,
|
|
514
|
+
resource_name: str,
|
|
515
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
516
|
+
auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
517
|
+
auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
|
|
518
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
519
|
+
cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
520
|
+
delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
|
|
521
|
+
disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
522
|
+
enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
523
|
+
expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
524
|
+
max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
525
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
526
|
+
ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
527
|
+
ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
528
|
+
unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
529
|
+
unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
530
|
+
__props__=None):
|
|
531
|
+
"""
|
|
532
|
+
Allows setting the duration for which the generated CRL should be marked valid. If the CRL is disabled, it will return a signed but zero-length CRL for any request. If enabled, it will re-build the CRL.
|
|
533
|
+
|
|
534
|
+
## Example Usage
|
|
535
|
+
|
|
536
|
+
```python
|
|
537
|
+
import pulumi
|
|
538
|
+
import pulumi_vault as vault
|
|
539
|
+
|
|
540
|
+
pki = vault.Mount("pki",
|
|
541
|
+
path="%s",
|
|
542
|
+
type="pki",
|
|
543
|
+
default_lease_ttl_seconds=3600,
|
|
544
|
+
max_lease_ttl_seconds=86400)
|
|
545
|
+
crl_config = vault.pkisecret.SecretBackendCrlConfig("crl_config",
|
|
546
|
+
backend=pki.path,
|
|
547
|
+
expiry="72h",
|
|
548
|
+
disable=False)
|
|
549
|
+
```
|
|
550
|
+
|
|
551
|
+
:param str resource_name: The name of the resource.
|
|
552
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
553
|
+
:param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
554
|
+
:param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
555
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
556
|
+
:param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
557
|
+
:param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
|
|
558
|
+
:param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
|
|
559
|
+
:param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
|
|
560
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
561
|
+
:param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
|
|
562
|
+
:param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
|
|
563
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
564
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
565
|
+
The value should not contain leading or trailing forward slashes.
|
|
566
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
567
|
+
*Available only for Vault Enterprise*.
|
|
568
|
+
:param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
569
|
+
:param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
570
|
+
refresh durations. **Vault 1.12+**
|
|
571
|
+
:param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
572
|
+
:param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
|
|
573
|
+
cluster-local paths. **Vault 1.13+**
|
|
574
|
+
"""
|
|
575
|
+
...
|
|
576
|
+
@overload
|
|
577
|
+
def __init__(__self__,
|
|
578
|
+
resource_name: str,
|
|
579
|
+
args: SecretBackendCrlConfigArgs,
|
|
580
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
581
|
+
"""
|
|
582
|
+
Allows setting the duration for which the generated CRL should be marked valid. If the CRL is disabled, it will return a signed but zero-length CRL for any request. If enabled, it will re-build the CRL.
|
|
583
|
+
|
|
584
|
+
## Example Usage
|
|
585
|
+
|
|
586
|
+
```python
|
|
587
|
+
import pulumi
|
|
588
|
+
import pulumi_vault as vault
|
|
589
|
+
|
|
590
|
+
pki = vault.Mount("pki",
|
|
591
|
+
path="%s",
|
|
592
|
+
type="pki",
|
|
593
|
+
default_lease_ttl_seconds=3600,
|
|
594
|
+
max_lease_ttl_seconds=86400)
|
|
595
|
+
crl_config = vault.pkisecret.SecretBackendCrlConfig("crl_config",
|
|
596
|
+
backend=pki.path,
|
|
597
|
+
expiry="72h",
|
|
598
|
+
disable=False)
|
|
599
|
+
```
|
|
600
|
+
|
|
601
|
+
:param str resource_name: The name of the resource.
|
|
602
|
+
:param SecretBackendCrlConfigArgs args: The arguments to use to populate this resource's properties.
|
|
603
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
604
|
+
"""
|
|
605
|
+
...
|
|
606
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
607
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretBackendCrlConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
608
|
+
if resource_args is not None:
|
|
609
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
610
|
+
else:
|
|
611
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
612
|
+
|
|
613
|
+
def _internal_init(__self__,
|
|
614
|
+
resource_name: str,
|
|
615
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
616
|
+
auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
617
|
+
auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
|
|
618
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
619
|
+
cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
620
|
+
delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
|
|
621
|
+
disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
622
|
+
enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
623
|
+
expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
624
|
+
max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
625
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
626
|
+
ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
627
|
+
ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
628
|
+
unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
629
|
+
unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
630
|
+
__props__=None):
|
|
631
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
632
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
633
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
634
|
+
if opts.id is None:
|
|
635
|
+
if __props__ is not None:
|
|
636
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
637
|
+
__props__ = SecretBackendCrlConfigArgs.__new__(SecretBackendCrlConfigArgs)
|
|
638
|
+
|
|
639
|
+
__props__.__dict__["auto_rebuild"] = auto_rebuild
|
|
640
|
+
__props__.__dict__["auto_rebuild_grace_period"] = auto_rebuild_grace_period
|
|
641
|
+
if backend is None and not opts.urn:
|
|
642
|
+
raise TypeError("Missing required property 'backend'")
|
|
643
|
+
__props__.__dict__["backend"] = backend
|
|
644
|
+
__props__.__dict__["cross_cluster_revocation"] = cross_cluster_revocation
|
|
645
|
+
__props__.__dict__["delta_rebuild_interval"] = delta_rebuild_interval
|
|
646
|
+
__props__.__dict__["disable"] = disable
|
|
647
|
+
__props__.__dict__["enable_delta"] = enable_delta
|
|
648
|
+
__props__.__dict__["expiry"] = expiry
|
|
649
|
+
__props__.__dict__["max_crl_entries"] = max_crl_entries
|
|
650
|
+
__props__.__dict__["namespace"] = namespace
|
|
651
|
+
__props__.__dict__["ocsp_disable"] = ocsp_disable
|
|
652
|
+
__props__.__dict__["ocsp_expiry"] = ocsp_expiry
|
|
653
|
+
__props__.__dict__["unified_crl"] = unified_crl
|
|
654
|
+
__props__.__dict__["unified_crl_on_existing_paths"] = unified_crl_on_existing_paths
|
|
655
|
+
super(SecretBackendCrlConfig, __self__).__init__(
|
|
656
|
+
'vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig',
|
|
657
|
+
resource_name,
|
|
658
|
+
__props__,
|
|
659
|
+
opts)
|
|
660
|
+
|
|
661
|
+
@staticmethod
|
|
662
|
+
def get(resource_name: str,
|
|
663
|
+
id: pulumi.Input[str],
|
|
664
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
665
|
+
auto_rebuild: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
666
|
+
auto_rebuild_grace_period: Optional[pulumi.Input[_builtins.str]] = None,
|
|
667
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
668
|
+
cross_cluster_revocation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
669
|
+
delta_rebuild_interval: Optional[pulumi.Input[_builtins.str]] = None,
|
|
670
|
+
disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
671
|
+
enable_delta: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
672
|
+
expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
673
|
+
max_crl_entries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
674
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
675
|
+
ocsp_disable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
676
|
+
ocsp_expiry: Optional[pulumi.Input[_builtins.str]] = None,
|
|
677
|
+
unified_crl: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
678
|
+
unified_crl_on_existing_paths: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackendCrlConfig':
|
|
679
|
+
"""
|
|
680
|
+
Get an existing SecretBackendCrlConfig resource's state with the given name, id, and optional extra
|
|
681
|
+
properties used to qualify the lookup.
|
|
682
|
+
|
|
683
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
684
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
685
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
686
|
+
:param pulumi.Input[_builtins.bool] auto_rebuild: Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
687
|
+
:param pulumi.Input[_builtins.str] auto_rebuild_grace_period: Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
688
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
689
|
+
:param pulumi.Input[_builtins.bool] cross_cluster_revocation: Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
690
|
+
:param pulumi.Input[_builtins.str] delta_rebuild_interval: Interval to check for new revocations on, to regenerate the delta CRL.
|
|
691
|
+
:param pulumi.Input[_builtins.bool] disable: Disables or enables CRL building.
|
|
692
|
+
:param pulumi.Input[_builtins.bool] enable_delta: Enables building of delta CRLs with up-to-date revocation information,
|
|
693
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
694
|
+
:param pulumi.Input[_builtins.str] expiry: Specifies the time until expiration.
|
|
695
|
+
:param pulumi.Input[_builtins.int] max_crl_entries: The maximum number of entries a CRL can contain. This option exists to prevent
|
|
696
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
697
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
698
|
+
The value should not contain leading or trailing forward slashes.
|
|
699
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
700
|
+
*Available only for Vault Enterprise*.
|
|
701
|
+
:param pulumi.Input[_builtins.bool] ocsp_disable: Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
702
|
+
:param pulumi.Input[_builtins.str] ocsp_expiry: The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
703
|
+
refresh durations. **Vault 1.12+**
|
|
704
|
+
:param pulumi.Input[_builtins.bool] unified_crl: Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
705
|
+
:param pulumi.Input[_builtins.bool] unified_crl_on_existing_paths: Enables serving the unified CRL and OCSP on the existing, previously
|
|
706
|
+
cluster-local paths. **Vault 1.13+**
|
|
707
|
+
"""
|
|
708
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
709
|
+
|
|
710
|
+
__props__ = _SecretBackendCrlConfigState.__new__(_SecretBackendCrlConfigState)
|
|
711
|
+
|
|
712
|
+
__props__.__dict__["auto_rebuild"] = auto_rebuild
|
|
713
|
+
__props__.__dict__["auto_rebuild_grace_period"] = auto_rebuild_grace_period
|
|
714
|
+
__props__.__dict__["backend"] = backend
|
|
715
|
+
__props__.__dict__["cross_cluster_revocation"] = cross_cluster_revocation
|
|
716
|
+
__props__.__dict__["delta_rebuild_interval"] = delta_rebuild_interval
|
|
717
|
+
__props__.__dict__["disable"] = disable
|
|
718
|
+
__props__.__dict__["enable_delta"] = enable_delta
|
|
719
|
+
__props__.__dict__["expiry"] = expiry
|
|
720
|
+
__props__.__dict__["max_crl_entries"] = max_crl_entries
|
|
721
|
+
__props__.__dict__["namespace"] = namespace
|
|
722
|
+
__props__.__dict__["ocsp_disable"] = ocsp_disable
|
|
723
|
+
__props__.__dict__["ocsp_expiry"] = ocsp_expiry
|
|
724
|
+
__props__.__dict__["unified_crl"] = unified_crl
|
|
725
|
+
__props__.__dict__["unified_crl_on_existing_paths"] = unified_crl_on_existing_paths
|
|
726
|
+
return SecretBackendCrlConfig(resource_name, opts=opts, __props__=__props__)
|
|
727
|
+
|
|
728
|
+
@_builtins.property
|
|
729
|
+
@pulumi.getter(name="autoRebuild")
|
|
730
|
+
def auto_rebuild(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
731
|
+
"""
|
|
732
|
+
Enables periodic rebuilding of the CRL upon expiry. **Vault 1.12+**
|
|
733
|
+
"""
|
|
734
|
+
return pulumi.get(self, "auto_rebuild")
|
|
735
|
+
|
|
736
|
+
@_builtins.property
|
|
737
|
+
@pulumi.getter(name="autoRebuildGracePeriod")
|
|
738
|
+
def auto_rebuild_grace_period(self) -> pulumi.Output[_builtins.str]:
|
|
739
|
+
"""
|
|
740
|
+
Grace period before CRL expiry to attempt rebuild of CRL. **Vault 1.12+**
|
|
741
|
+
"""
|
|
742
|
+
return pulumi.get(self, "auto_rebuild_grace_period")
|
|
743
|
+
|
|
744
|
+
@_builtins.property
|
|
745
|
+
@pulumi.getter
|
|
746
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
|
747
|
+
"""
|
|
748
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
749
|
+
"""
|
|
750
|
+
return pulumi.get(self, "backend")
|
|
751
|
+
|
|
752
|
+
@_builtins.property
|
|
753
|
+
@pulumi.getter(name="crossClusterRevocation")
|
|
754
|
+
def cross_cluster_revocation(self) -> pulumi.Output[_builtins.bool]:
|
|
755
|
+
"""
|
|
756
|
+
Enable cross-cluster revocation request queues. **Vault 1.13+**
|
|
757
|
+
"""
|
|
758
|
+
return pulumi.get(self, "cross_cluster_revocation")
|
|
759
|
+
|
|
760
|
+
@_builtins.property
|
|
761
|
+
@pulumi.getter(name="deltaRebuildInterval")
|
|
762
|
+
def delta_rebuild_interval(self) -> pulumi.Output[_builtins.str]:
|
|
763
|
+
"""
|
|
764
|
+
Interval to check for new revocations on, to regenerate the delta CRL.
|
|
765
|
+
"""
|
|
766
|
+
return pulumi.get(self, "delta_rebuild_interval")
|
|
767
|
+
|
|
768
|
+
@_builtins.property
|
|
769
|
+
@pulumi.getter
|
|
770
|
+
def disable(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
771
|
+
"""
|
|
772
|
+
Disables or enables CRL building.
|
|
773
|
+
"""
|
|
774
|
+
return pulumi.get(self, "disable")
|
|
775
|
+
|
|
776
|
+
@_builtins.property
|
|
777
|
+
@pulumi.getter(name="enableDelta")
|
|
778
|
+
def enable_delta(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
779
|
+
"""
|
|
780
|
+
Enables building of delta CRLs with up-to-date revocation information,
|
|
781
|
+
augmenting the last complete CRL. **Vault 1.12+**
|
|
782
|
+
"""
|
|
783
|
+
return pulumi.get(self, "enable_delta")
|
|
784
|
+
|
|
785
|
+
@_builtins.property
|
|
786
|
+
@pulumi.getter
|
|
787
|
+
def expiry(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
788
|
+
"""
|
|
789
|
+
Specifies the time until expiration.
|
|
790
|
+
"""
|
|
791
|
+
return pulumi.get(self, "expiry")
|
|
792
|
+
|
|
793
|
+
@_builtins.property
|
|
794
|
+
@pulumi.getter(name="maxCrlEntries")
|
|
795
|
+
def max_crl_entries(self) -> pulumi.Output[_builtins.int]:
|
|
796
|
+
"""
|
|
797
|
+
The maximum number of entries a CRL can contain. This option exists to prevent
|
|
798
|
+
accidental runaway issuance/revocation from overloading Vault. If set to -1, the limit is disabled. **Vault 1.19**
|
|
799
|
+
"""
|
|
800
|
+
return pulumi.get(self, "max_crl_entries")
|
|
801
|
+
|
|
802
|
+
@_builtins.property
|
|
803
|
+
@pulumi.getter
|
|
804
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
805
|
+
"""
|
|
806
|
+
The namespace to provision the resource in.
|
|
807
|
+
The value should not contain leading or trailing forward slashes.
|
|
808
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
809
|
+
*Available only for Vault Enterprise*.
|
|
810
|
+
"""
|
|
811
|
+
return pulumi.get(self, "namespace")
|
|
812
|
+
|
|
813
|
+
@_builtins.property
|
|
814
|
+
@pulumi.getter(name="ocspDisable")
|
|
815
|
+
def ocsp_disable(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
816
|
+
"""
|
|
817
|
+
Disables the OCSP responder in Vault. **Vault 1.12+**
|
|
818
|
+
"""
|
|
819
|
+
return pulumi.get(self, "ocsp_disable")
|
|
820
|
+
|
|
821
|
+
@_builtins.property
|
|
822
|
+
@pulumi.getter(name="ocspExpiry")
|
|
823
|
+
def ocsp_expiry(self) -> pulumi.Output[_builtins.str]:
|
|
824
|
+
"""
|
|
825
|
+
The amount of time an OCSP response can be cached for, useful for OCSP stapling
|
|
826
|
+
refresh durations. **Vault 1.12+**
|
|
827
|
+
"""
|
|
828
|
+
return pulumi.get(self, "ocsp_expiry")
|
|
829
|
+
|
|
830
|
+
@_builtins.property
|
|
831
|
+
@pulumi.getter(name="unifiedCrl")
|
|
832
|
+
def unified_crl(self) -> pulumi.Output[_builtins.bool]:
|
|
833
|
+
"""
|
|
834
|
+
Enables unified CRL and OCSP building. **Vault 1.13+**
|
|
835
|
+
"""
|
|
836
|
+
return pulumi.get(self, "unified_crl")
|
|
837
|
+
|
|
838
|
+
@_builtins.property
|
|
839
|
+
@pulumi.getter(name="unifiedCrlOnExistingPaths")
|
|
840
|
+
def unified_crl_on_existing_paths(self) -> pulumi.Output[_builtins.bool]:
|
|
841
|
+
"""
|
|
842
|
+
Enables serving the unified CRL and OCSP on the existing, previously
|
|
843
|
+
cluster-local paths. **Vault 1.13+**
|
|
844
|
+
"""
|
|
845
|
+
return pulumi.get(self, "unified_crl_on_existing_paths")
|
|
846
|
+
|