pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,444 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['SecretBackendIntermediateSetSignedArgs', 'SecretBackendIntermediateSetSigned']
18
+
19
+ @pulumi.input_type
20
+ class SecretBackendIntermediateSetSignedArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ certificate: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
25
+ """
26
+ The set of arguments for constructing a SecretBackendIntermediateSetSigned resource.
27
+ :param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
28
+ :param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
29
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
30
+ issue and sign operations.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
+ The value should not contain leading or trailing forward slashes.
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
+ *Available only for Vault Enterprise*.
35
+ """
36
+ pulumi.set(__self__, "backend", backend)
37
+ pulumi.set(__self__, "certificate", certificate)
38
+ if namespace is not None:
39
+ pulumi.set(__self__, "namespace", namespace)
40
+
41
+ @_builtins.property
42
+ @pulumi.getter
43
+ def backend(self) -> pulumi.Input[_builtins.str]:
44
+ """
45
+ The PKI secret backend the resource belongs to.
46
+ """
47
+ return pulumi.get(self, "backend")
48
+
49
+ @backend.setter
50
+ def backend(self, value: pulumi.Input[_builtins.str]):
51
+ pulumi.set(self, "backend", value)
52
+
53
+ @_builtins.property
54
+ @pulumi.getter
55
+ def certificate(self) -> pulumi.Input[_builtins.str]:
56
+ """
57
+ Specifies the PEM encoded certificate. May optionally append additional
58
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
59
+ issue and sign operations.
60
+ """
61
+ return pulumi.get(self, "certificate")
62
+
63
+ @certificate.setter
64
+ def certificate(self, value: pulumi.Input[_builtins.str]):
65
+ pulumi.set(self, "certificate", value)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter
69
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
70
+ """
71
+ The namespace to provision the resource in.
72
+ The value should not contain leading or trailing forward slashes.
73
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
74
+ *Available only for Vault Enterprise*.
75
+ """
76
+ return pulumi.get(self, "namespace")
77
+
78
+ @namespace.setter
79
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
80
+ pulumi.set(self, "namespace", value)
81
+
82
+
83
+ @pulumi.input_type
84
+ class _SecretBackendIntermediateSetSignedState:
85
+ def __init__(__self__, *,
86
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
87
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
88
+ imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
89
+ imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
90
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
91
+ """
92
+ Input properties used for looking up and filtering SecretBackendIntermediateSetSigned resources.
93
+ :param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
94
+ :param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
95
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
96
+ issue and sign operations.
97
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_issuers: The imported issuers indicating which issuers were created as part of
98
+ this request.
99
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
100
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
101
+ The value should not contain leading or trailing forward slashes.
102
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
+ *Available only for Vault Enterprise*.
104
+ """
105
+ if backend is not None:
106
+ pulumi.set(__self__, "backend", backend)
107
+ if certificate is not None:
108
+ pulumi.set(__self__, "certificate", certificate)
109
+ if imported_issuers is not None:
110
+ pulumi.set(__self__, "imported_issuers", imported_issuers)
111
+ if imported_keys is not None:
112
+ pulumi.set(__self__, "imported_keys", imported_keys)
113
+ if namespace is not None:
114
+ pulumi.set(__self__, "namespace", namespace)
115
+
116
+ @_builtins.property
117
+ @pulumi.getter
118
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
119
+ """
120
+ The PKI secret backend the resource belongs to.
121
+ """
122
+ return pulumi.get(self, "backend")
123
+
124
+ @backend.setter
125
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
126
+ pulumi.set(self, "backend", value)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter
130
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
131
+ """
132
+ Specifies the PEM encoded certificate. May optionally append additional
133
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
134
+ issue and sign operations.
135
+ """
136
+ return pulumi.get(self, "certificate")
137
+
138
+ @certificate.setter
139
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
140
+ pulumi.set(self, "certificate", value)
141
+
142
+ @_builtins.property
143
+ @pulumi.getter(name="importedIssuers")
144
+ def imported_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
145
+ """
146
+ The imported issuers indicating which issuers were created as part of
147
+ this request.
148
+ """
149
+ return pulumi.get(self, "imported_issuers")
150
+
151
+ @imported_issuers.setter
152
+ def imported_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
153
+ pulumi.set(self, "imported_issuers", value)
154
+
155
+ @_builtins.property
156
+ @pulumi.getter(name="importedKeys")
157
+ def imported_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
158
+ """
159
+ The imported keys indicating which keys were created as part of this request.
160
+ """
161
+ return pulumi.get(self, "imported_keys")
162
+
163
+ @imported_keys.setter
164
+ def imported_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
165
+ pulumi.set(self, "imported_keys", value)
166
+
167
+ @_builtins.property
168
+ @pulumi.getter
169
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
170
+ """
171
+ The namespace to provision the resource in.
172
+ The value should not contain leading or trailing forward slashes.
173
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
174
+ *Available only for Vault Enterprise*.
175
+ """
176
+ return pulumi.get(self, "namespace")
177
+
178
+ @namespace.setter
179
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
180
+ pulumi.set(self, "namespace", value)
181
+
182
+
183
+ @pulumi.type_token("vault:pkiSecret/secretBackendIntermediateSetSigned:SecretBackendIntermediateSetSigned")
184
+ class SecretBackendIntermediateSetSigned(pulumi.CustomResource):
185
+ @overload
186
+ def __init__(__self__,
187
+ resource_name: str,
188
+ opts: Optional[pulumi.ResourceOptions] = None,
189
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
190
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
191
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
192
+ __props__=None):
193
+ """
194
+ ## Example Usage
195
+
196
+ ```python
197
+ import pulumi
198
+ import pulumi_vault as vault
199
+
200
+ root = vault.Mount("root",
201
+ path="pki-root",
202
+ type="pki",
203
+ description="root",
204
+ default_lease_ttl_seconds=8640000,
205
+ max_lease_ttl_seconds=8640000)
206
+ intermediate = vault.Mount("intermediate",
207
+ path="pki-int",
208
+ type=root.type,
209
+ description="intermediate",
210
+ default_lease_ttl_seconds=86400,
211
+ max_lease_ttl_seconds=86400)
212
+ example = vault.pkisecret.SecretBackendRootCert("example",
213
+ backend=root.path,
214
+ type="internal",
215
+ common_name="RootOrg Root CA",
216
+ ttl="86400",
217
+ format="pem",
218
+ private_key_format="der",
219
+ key_type="rsa",
220
+ key_bits=4096,
221
+ exclude_cn_from_sans=True,
222
+ ou="Organizational Unit",
223
+ organization="RootOrg",
224
+ country="US",
225
+ locality="San Francisco",
226
+ province="CA")
227
+ example_secret_backend_intermediate_cert_request = vault.pkisecret.SecretBackendIntermediateCertRequest("example",
228
+ backend=intermediate.path,
229
+ type=example.type,
230
+ common_name="SubOrg Intermediate CA")
231
+ example_secret_backend_root_sign_intermediate = vault.pkisecret.SecretBackendRootSignIntermediate("example",
232
+ backend=root.path,
233
+ csr=example_secret_backend_intermediate_cert_request.csr,
234
+ common_name="SubOrg Intermediate CA",
235
+ exclude_cn_from_sans=True,
236
+ ou="SubUnit",
237
+ organization="SubOrg",
238
+ country="US",
239
+ locality="San Francisco",
240
+ province="CA",
241
+ revoke=True)
242
+ example_secret_backend_intermediate_set_signed = vault.pkisecret.SecretBackendIntermediateSetSigned("example",
243
+ backend=intermediate.path,
244
+ certificate=example_secret_backend_root_sign_intermediate.certificate)
245
+ ```
246
+
247
+ :param str resource_name: The name of the resource.
248
+ :param pulumi.ResourceOptions opts: Options for the resource.
249
+ :param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
250
+ :param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
251
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
252
+ issue and sign operations.
253
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
254
+ The value should not contain leading or trailing forward slashes.
255
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
+ *Available only for Vault Enterprise*.
257
+ """
258
+ ...
259
+ @overload
260
+ def __init__(__self__,
261
+ resource_name: str,
262
+ args: SecretBackendIntermediateSetSignedArgs,
263
+ opts: Optional[pulumi.ResourceOptions] = None):
264
+ """
265
+ ## Example Usage
266
+
267
+ ```python
268
+ import pulumi
269
+ import pulumi_vault as vault
270
+
271
+ root = vault.Mount("root",
272
+ path="pki-root",
273
+ type="pki",
274
+ description="root",
275
+ default_lease_ttl_seconds=8640000,
276
+ max_lease_ttl_seconds=8640000)
277
+ intermediate = vault.Mount("intermediate",
278
+ path="pki-int",
279
+ type=root.type,
280
+ description="intermediate",
281
+ default_lease_ttl_seconds=86400,
282
+ max_lease_ttl_seconds=86400)
283
+ example = vault.pkisecret.SecretBackendRootCert("example",
284
+ backend=root.path,
285
+ type="internal",
286
+ common_name="RootOrg Root CA",
287
+ ttl="86400",
288
+ format="pem",
289
+ private_key_format="der",
290
+ key_type="rsa",
291
+ key_bits=4096,
292
+ exclude_cn_from_sans=True,
293
+ ou="Organizational Unit",
294
+ organization="RootOrg",
295
+ country="US",
296
+ locality="San Francisco",
297
+ province="CA")
298
+ example_secret_backend_intermediate_cert_request = vault.pkisecret.SecretBackendIntermediateCertRequest("example",
299
+ backend=intermediate.path,
300
+ type=example.type,
301
+ common_name="SubOrg Intermediate CA")
302
+ example_secret_backend_root_sign_intermediate = vault.pkisecret.SecretBackendRootSignIntermediate("example",
303
+ backend=root.path,
304
+ csr=example_secret_backend_intermediate_cert_request.csr,
305
+ common_name="SubOrg Intermediate CA",
306
+ exclude_cn_from_sans=True,
307
+ ou="SubUnit",
308
+ organization="SubOrg",
309
+ country="US",
310
+ locality="San Francisco",
311
+ province="CA",
312
+ revoke=True)
313
+ example_secret_backend_intermediate_set_signed = vault.pkisecret.SecretBackendIntermediateSetSigned("example",
314
+ backend=intermediate.path,
315
+ certificate=example_secret_backend_root_sign_intermediate.certificate)
316
+ ```
317
+
318
+ :param str resource_name: The name of the resource.
319
+ :param SecretBackendIntermediateSetSignedArgs args: The arguments to use to populate this resource's properties.
320
+ :param pulumi.ResourceOptions opts: Options for the resource.
321
+ """
322
+ ...
323
+ def __init__(__self__, resource_name: str, *args, **kwargs):
324
+ resource_args, opts = _utilities.get_resource_args_opts(SecretBackendIntermediateSetSignedArgs, pulumi.ResourceOptions, *args, **kwargs)
325
+ if resource_args is not None:
326
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
327
+ else:
328
+ __self__._internal_init(resource_name, *args, **kwargs)
329
+
330
+ def _internal_init(__self__,
331
+ resource_name: str,
332
+ opts: Optional[pulumi.ResourceOptions] = None,
333
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
334
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
335
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
336
+ __props__=None):
337
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
338
+ if not isinstance(opts, pulumi.ResourceOptions):
339
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
340
+ if opts.id is None:
341
+ if __props__ is not None:
342
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
343
+ __props__ = SecretBackendIntermediateSetSignedArgs.__new__(SecretBackendIntermediateSetSignedArgs)
344
+
345
+ if backend is None and not opts.urn:
346
+ raise TypeError("Missing required property 'backend'")
347
+ __props__.__dict__["backend"] = backend
348
+ if certificate is None and not opts.urn:
349
+ raise TypeError("Missing required property 'certificate'")
350
+ __props__.__dict__["certificate"] = certificate
351
+ __props__.__dict__["namespace"] = namespace
352
+ __props__.__dict__["imported_issuers"] = None
353
+ __props__.__dict__["imported_keys"] = None
354
+ super(SecretBackendIntermediateSetSigned, __self__).__init__(
355
+ 'vault:pkiSecret/secretBackendIntermediateSetSigned:SecretBackendIntermediateSetSigned',
356
+ resource_name,
357
+ __props__,
358
+ opts)
359
+
360
+ @staticmethod
361
+ def get(resource_name: str,
362
+ id: pulumi.Input[str],
363
+ opts: Optional[pulumi.ResourceOptions] = None,
364
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
365
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
366
+ imported_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
367
+ imported_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
368
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendIntermediateSetSigned':
369
+ """
370
+ Get an existing SecretBackendIntermediateSetSigned resource's state with the given name, id, and optional extra
371
+ properties used to qualify the lookup.
372
+
373
+ :param str resource_name: The unique name of the resulting resource.
374
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
375
+ :param pulumi.ResourceOptions opts: Options for the resource.
376
+ :param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
377
+ :param pulumi.Input[_builtins.str] certificate: Specifies the PEM encoded certificate. May optionally append additional
378
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
379
+ issue and sign operations.
380
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_issuers: The imported issuers indicating which issuers were created as part of
381
+ this request.
382
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] imported_keys: The imported keys indicating which keys were created as part of this request.
383
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
384
+ The value should not contain leading or trailing forward slashes.
385
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
386
+ *Available only for Vault Enterprise*.
387
+ """
388
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
389
+
390
+ __props__ = _SecretBackendIntermediateSetSignedState.__new__(_SecretBackendIntermediateSetSignedState)
391
+
392
+ __props__.__dict__["backend"] = backend
393
+ __props__.__dict__["certificate"] = certificate
394
+ __props__.__dict__["imported_issuers"] = imported_issuers
395
+ __props__.__dict__["imported_keys"] = imported_keys
396
+ __props__.__dict__["namespace"] = namespace
397
+ return SecretBackendIntermediateSetSigned(resource_name, opts=opts, __props__=__props__)
398
+
399
+ @_builtins.property
400
+ @pulumi.getter
401
+ def backend(self) -> pulumi.Output[_builtins.str]:
402
+ """
403
+ The PKI secret backend the resource belongs to.
404
+ """
405
+ return pulumi.get(self, "backend")
406
+
407
+ @_builtins.property
408
+ @pulumi.getter
409
+ def certificate(self) -> pulumi.Output[_builtins.str]:
410
+ """
411
+ Specifies the PEM encoded certificate. May optionally append additional
412
+ CA certificates to populate the whole chain, which will then enable returning the full chain from
413
+ issue and sign operations.
414
+ """
415
+ return pulumi.get(self, "certificate")
416
+
417
+ @_builtins.property
418
+ @pulumi.getter(name="importedIssuers")
419
+ def imported_issuers(self) -> pulumi.Output[Sequence[_builtins.str]]:
420
+ """
421
+ The imported issuers indicating which issuers were created as part of
422
+ this request.
423
+ """
424
+ return pulumi.get(self, "imported_issuers")
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="importedKeys")
428
+ def imported_keys(self) -> pulumi.Output[Sequence[_builtins.str]]:
429
+ """
430
+ The imported keys indicating which keys were created as part of this request.
431
+ """
432
+ return pulumi.get(self, "imported_keys")
433
+
434
+ @_builtins.property
435
+ @pulumi.getter
436
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
437
+ """
438
+ The namespace to provision the resource in.
439
+ The value should not contain leading or trailing forward slashes.
440
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
441
+ *Available only for Vault Enterprise*.
442
+ """
443
+ return pulumi.get(self, "namespace")
444
+