pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,2694 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._inputs import *
|
|
18
|
+
|
|
19
|
+
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
20
|
+
|
|
21
|
+
@pulumi.input_type
|
|
22
|
+
class SecretBackendRoleArgs:
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
|
25
|
+
allow_any_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
27
|
+
allow_glob_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
28
|
+
allow_ip_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
29
|
+
allow_localhost: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
30
|
+
allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
31
|
+
allow_wildcard_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
32
|
+
allowed_domains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
33
|
+
allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
34
|
+
allowed_other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
35
|
+
allowed_serial_numbers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
36
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
37
|
+
allowed_uri_sans_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
38
|
+
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
39
|
+
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
40
|
+
client_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
41
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
42
|
+
code_signing_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
43
|
+
countries: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
44
|
+
email_protection_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
45
|
+
enforce_hostnames: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
46
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
47
|
+
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
48
|
+
generate_lease: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
49
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
50
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
51
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
52
|
+
key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
53
|
+
localities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
54
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
55
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
56
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
57
|
+
no_store: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
58
|
+
no_store_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
59
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
60
|
+
not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
|
|
61
|
+
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
62
|
+
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
63
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]] = None,
|
|
64
|
+
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
65
|
+
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
66
|
+
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
67
|
+
require_cn: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
68
|
+
serial_number_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
69
|
+
server_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
70
|
+
signature_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
71
|
+
street_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
72
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
73
|
+
use_csr_common_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
74
|
+
use_csr_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
75
|
+
use_pss: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
76
|
+
"""
|
|
77
|
+
The set of arguments for constructing a SecretBackendRole resource.
|
|
78
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
79
|
+
:param pulumi.Input[_builtins.bool] allow_any_name: Flag to allow any name
|
|
80
|
+
:param pulumi.Input[_builtins.bool] allow_bare_domains: Flag to allow certificates matching the actual domain
|
|
81
|
+
:param pulumi.Input[_builtins.bool] allow_glob_domains: Flag to allow names containing glob patterns.
|
|
82
|
+
:param pulumi.Input[_builtins.bool] allow_ip_sans: Flag to allow IP SANs
|
|
83
|
+
:param pulumi.Input[_builtins.bool] allow_localhost: Flag to allow certificates for localhost
|
|
84
|
+
:param pulumi.Input[_builtins.bool] allow_subdomains: Flag to allow certificates matching subdomains
|
|
85
|
+
:param pulumi.Input[_builtins.bool] allow_wildcard_certificates: Flag to allow wildcard certificates.
|
|
86
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_domains: List of allowed domains for certificates
|
|
87
|
+
:param pulumi.Input[_builtins.bool] allowed_domains_template: Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
88
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_other_sans: Defines allowed custom SANs
|
|
89
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_serial_numbers: An array of allowed serial numbers to put in Subject
|
|
90
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Defines allowed URI SANs
|
|
91
|
+
:param pulumi.Input[_builtins.bool] allowed_uri_sans_template: Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
92
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_user_ids: Defines allowed User IDs
|
|
93
|
+
:param pulumi.Input[_builtins.bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
|
94
|
+
:param pulumi.Input[_builtins.bool] client_flag: Flag to specify certificates for client use
|
|
95
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
96
|
+
:param pulumi.Input[_builtins.bool] code_signing_flag: Flag to specify certificates for code signing use
|
|
97
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] countries: The country of generated certificates
|
|
98
|
+
:param pulumi.Input[_builtins.bool] email_protection_flag: Flag to specify certificates for email protection use
|
|
99
|
+
:param pulumi.Input[_builtins.bool] enforce_hostnames: Flag to allow only valid host names
|
|
100
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
101
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
|
102
|
+
:param pulumi.Input[_builtins.bool] generate_lease: Flag to generate leases with certificates
|
|
103
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. May
|
|
104
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
105
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
106
|
+
overriding the role's `issuer_ref` value.
|
|
107
|
+
:param pulumi.Input[_builtins.int] key_bits: The number of bits of generated keys
|
|
108
|
+
:param pulumi.Input[_builtins.str] key_type: The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
109
|
+
Defaults to `rsa`
|
|
110
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] key_usages: Specify the allowed key usage constraint on issued
|
|
111
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
112
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
113
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] localities: The locality of generated certificates
|
|
114
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum lease TTL, in seconds, for the role.
|
|
115
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend. Must be unique within the backend.
|
|
116
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
117
|
+
The value should not contain leading or trailing forward slashes.
|
|
118
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
119
|
+
*Available only for Vault Enterprise*.
|
|
120
|
+
:param pulumi.Input[_builtins.bool] no_store: Flag to not store certificates in the storage backend
|
|
121
|
+
:param pulumi.Input[_builtins.bool] no_store_metadata: Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
122
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
123
|
+
:param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
|
124
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organization_unit: The organization unit of generated certificates
|
|
125
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organizations: The organization of generated certificates
|
|
126
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
127
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
128
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] postal_codes: The postal code of generated certificates
|
|
129
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] provinces: The province of generated certificates
|
|
130
|
+
:param pulumi.Input[_builtins.bool] require_cn: Flag to force CN usage
|
|
131
|
+
:param pulumi.Input[_builtins.str] serial_number_source: Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
132
|
+
|
|
133
|
+
Example usage:
|
|
134
|
+
:param pulumi.Input[_builtins.bool] server_flag: Flag to specify certificates for server use
|
|
135
|
+
:param pulumi.Input[_builtins.int] signature_bits: The number of bits to use in the signature algorithm
|
|
136
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] street_addresses: The street address of generated certificates
|
|
137
|
+
:param pulumi.Input[_builtins.str] ttl: The TTL, in seconds, for any certificate issued against this role.
|
|
138
|
+
:param pulumi.Input[_builtins.bool] use_csr_common_name: Flag to use the CN in the CSR
|
|
139
|
+
:param pulumi.Input[_builtins.bool] use_csr_sans: Flag to use the SANs in the CSR
|
|
140
|
+
:param pulumi.Input[_builtins.bool] use_pss: Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
141
|
+
"""
|
|
142
|
+
pulumi.set(__self__, "backend", backend)
|
|
143
|
+
if allow_any_name is not None:
|
|
144
|
+
pulumi.set(__self__, "allow_any_name", allow_any_name)
|
|
145
|
+
if allow_bare_domains is not None:
|
|
146
|
+
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
|
147
|
+
if allow_glob_domains is not None:
|
|
148
|
+
pulumi.set(__self__, "allow_glob_domains", allow_glob_domains)
|
|
149
|
+
if allow_ip_sans is not None:
|
|
150
|
+
pulumi.set(__self__, "allow_ip_sans", allow_ip_sans)
|
|
151
|
+
if allow_localhost is not None:
|
|
152
|
+
pulumi.set(__self__, "allow_localhost", allow_localhost)
|
|
153
|
+
if allow_subdomains is not None:
|
|
154
|
+
pulumi.set(__self__, "allow_subdomains", allow_subdomains)
|
|
155
|
+
if allow_wildcard_certificates is not None:
|
|
156
|
+
pulumi.set(__self__, "allow_wildcard_certificates", allow_wildcard_certificates)
|
|
157
|
+
if allowed_domains is not None:
|
|
158
|
+
pulumi.set(__self__, "allowed_domains", allowed_domains)
|
|
159
|
+
if allowed_domains_template is not None:
|
|
160
|
+
pulumi.set(__self__, "allowed_domains_template", allowed_domains_template)
|
|
161
|
+
if allowed_other_sans is not None:
|
|
162
|
+
pulumi.set(__self__, "allowed_other_sans", allowed_other_sans)
|
|
163
|
+
if allowed_serial_numbers is not None:
|
|
164
|
+
pulumi.set(__self__, "allowed_serial_numbers", allowed_serial_numbers)
|
|
165
|
+
if allowed_uri_sans is not None:
|
|
166
|
+
pulumi.set(__self__, "allowed_uri_sans", allowed_uri_sans)
|
|
167
|
+
if allowed_uri_sans_template is not None:
|
|
168
|
+
pulumi.set(__self__, "allowed_uri_sans_template", allowed_uri_sans_template)
|
|
169
|
+
if allowed_user_ids is not None:
|
|
170
|
+
pulumi.set(__self__, "allowed_user_ids", allowed_user_ids)
|
|
171
|
+
if basic_constraints_valid_for_non_ca is not None:
|
|
172
|
+
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
|
173
|
+
if client_flag is not None:
|
|
174
|
+
pulumi.set(__self__, "client_flag", client_flag)
|
|
175
|
+
if cn_validations is not None:
|
|
176
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
|
177
|
+
if code_signing_flag is not None:
|
|
178
|
+
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
|
179
|
+
if countries is not None:
|
|
180
|
+
pulumi.set(__self__, "countries", countries)
|
|
181
|
+
if email_protection_flag is not None:
|
|
182
|
+
pulumi.set(__self__, "email_protection_flag", email_protection_flag)
|
|
183
|
+
if enforce_hostnames is not None:
|
|
184
|
+
pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
|
|
185
|
+
if ext_key_usage_oids is not None:
|
|
186
|
+
pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
|
|
187
|
+
if ext_key_usages is not None:
|
|
188
|
+
pulumi.set(__self__, "ext_key_usages", ext_key_usages)
|
|
189
|
+
if generate_lease is not None:
|
|
190
|
+
pulumi.set(__self__, "generate_lease", generate_lease)
|
|
191
|
+
if issuer_ref is not None:
|
|
192
|
+
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
|
193
|
+
if key_bits is not None:
|
|
194
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
195
|
+
if key_type is not None:
|
|
196
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
197
|
+
if key_usages is not None:
|
|
198
|
+
pulumi.set(__self__, "key_usages", key_usages)
|
|
199
|
+
if localities is not None:
|
|
200
|
+
pulumi.set(__self__, "localities", localities)
|
|
201
|
+
if max_ttl is not None:
|
|
202
|
+
pulumi.set(__self__, "max_ttl", max_ttl)
|
|
203
|
+
if name is not None:
|
|
204
|
+
pulumi.set(__self__, "name", name)
|
|
205
|
+
if namespace is not None:
|
|
206
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
207
|
+
if no_store is not None:
|
|
208
|
+
pulumi.set(__self__, "no_store", no_store)
|
|
209
|
+
if no_store_metadata is not None:
|
|
210
|
+
pulumi.set(__self__, "no_store_metadata", no_store_metadata)
|
|
211
|
+
if not_after is not None:
|
|
212
|
+
pulumi.set(__self__, "not_after", not_after)
|
|
213
|
+
if not_before_duration is not None:
|
|
214
|
+
pulumi.set(__self__, "not_before_duration", not_before_duration)
|
|
215
|
+
if organization_unit is not None:
|
|
216
|
+
pulumi.set(__self__, "organization_unit", organization_unit)
|
|
217
|
+
if organizations is not None:
|
|
218
|
+
pulumi.set(__self__, "organizations", organizations)
|
|
219
|
+
if policy_identifier is not None:
|
|
220
|
+
pulumi.set(__self__, "policy_identifier", policy_identifier)
|
|
221
|
+
if policy_identifiers is not None:
|
|
222
|
+
pulumi.set(__self__, "policy_identifiers", policy_identifiers)
|
|
223
|
+
if postal_codes is not None:
|
|
224
|
+
pulumi.set(__self__, "postal_codes", postal_codes)
|
|
225
|
+
if provinces is not None:
|
|
226
|
+
pulumi.set(__self__, "provinces", provinces)
|
|
227
|
+
if require_cn is not None:
|
|
228
|
+
pulumi.set(__self__, "require_cn", require_cn)
|
|
229
|
+
if serial_number_source is not None:
|
|
230
|
+
pulumi.set(__self__, "serial_number_source", serial_number_source)
|
|
231
|
+
if server_flag is not None:
|
|
232
|
+
pulumi.set(__self__, "server_flag", server_flag)
|
|
233
|
+
if signature_bits is not None:
|
|
234
|
+
pulumi.set(__self__, "signature_bits", signature_bits)
|
|
235
|
+
if street_addresses is not None:
|
|
236
|
+
pulumi.set(__self__, "street_addresses", street_addresses)
|
|
237
|
+
if ttl is not None:
|
|
238
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
239
|
+
if use_csr_common_name is not None:
|
|
240
|
+
pulumi.set(__self__, "use_csr_common_name", use_csr_common_name)
|
|
241
|
+
if use_csr_sans is not None:
|
|
242
|
+
pulumi.set(__self__, "use_csr_sans", use_csr_sans)
|
|
243
|
+
if use_pss is not None:
|
|
244
|
+
pulumi.set(__self__, "use_pss", use_pss)
|
|
245
|
+
|
|
246
|
+
@_builtins.property
|
|
247
|
+
@pulumi.getter
|
|
248
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
|
249
|
+
"""
|
|
250
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
251
|
+
"""
|
|
252
|
+
return pulumi.get(self, "backend")
|
|
253
|
+
|
|
254
|
+
@backend.setter
|
|
255
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
|
256
|
+
pulumi.set(self, "backend", value)
|
|
257
|
+
|
|
258
|
+
@_builtins.property
|
|
259
|
+
@pulumi.getter(name="allowAnyName")
|
|
260
|
+
def allow_any_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
261
|
+
"""
|
|
262
|
+
Flag to allow any name
|
|
263
|
+
"""
|
|
264
|
+
return pulumi.get(self, "allow_any_name")
|
|
265
|
+
|
|
266
|
+
@allow_any_name.setter
|
|
267
|
+
def allow_any_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
268
|
+
pulumi.set(self, "allow_any_name", value)
|
|
269
|
+
|
|
270
|
+
@_builtins.property
|
|
271
|
+
@pulumi.getter(name="allowBareDomains")
|
|
272
|
+
def allow_bare_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
273
|
+
"""
|
|
274
|
+
Flag to allow certificates matching the actual domain
|
|
275
|
+
"""
|
|
276
|
+
return pulumi.get(self, "allow_bare_domains")
|
|
277
|
+
|
|
278
|
+
@allow_bare_domains.setter
|
|
279
|
+
def allow_bare_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
280
|
+
pulumi.set(self, "allow_bare_domains", value)
|
|
281
|
+
|
|
282
|
+
@_builtins.property
|
|
283
|
+
@pulumi.getter(name="allowGlobDomains")
|
|
284
|
+
def allow_glob_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
285
|
+
"""
|
|
286
|
+
Flag to allow names containing glob patterns.
|
|
287
|
+
"""
|
|
288
|
+
return pulumi.get(self, "allow_glob_domains")
|
|
289
|
+
|
|
290
|
+
@allow_glob_domains.setter
|
|
291
|
+
def allow_glob_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
292
|
+
pulumi.set(self, "allow_glob_domains", value)
|
|
293
|
+
|
|
294
|
+
@_builtins.property
|
|
295
|
+
@pulumi.getter(name="allowIpSans")
|
|
296
|
+
def allow_ip_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
297
|
+
"""
|
|
298
|
+
Flag to allow IP SANs
|
|
299
|
+
"""
|
|
300
|
+
return pulumi.get(self, "allow_ip_sans")
|
|
301
|
+
|
|
302
|
+
@allow_ip_sans.setter
|
|
303
|
+
def allow_ip_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
304
|
+
pulumi.set(self, "allow_ip_sans", value)
|
|
305
|
+
|
|
306
|
+
@_builtins.property
|
|
307
|
+
@pulumi.getter(name="allowLocalhost")
|
|
308
|
+
def allow_localhost(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
309
|
+
"""
|
|
310
|
+
Flag to allow certificates for localhost
|
|
311
|
+
"""
|
|
312
|
+
return pulumi.get(self, "allow_localhost")
|
|
313
|
+
|
|
314
|
+
@allow_localhost.setter
|
|
315
|
+
def allow_localhost(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
316
|
+
pulumi.set(self, "allow_localhost", value)
|
|
317
|
+
|
|
318
|
+
@_builtins.property
|
|
319
|
+
@pulumi.getter(name="allowSubdomains")
|
|
320
|
+
def allow_subdomains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
321
|
+
"""
|
|
322
|
+
Flag to allow certificates matching subdomains
|
|
323
|
+
"""
|
|
324
|
+
return pulumi.get(self, "allow_subdomains")
|
|
325
|
+
|
|
326
|
+
@allow_subdomains.setter
|
|
327
|
+
def allow_subdomains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
328
|
+
pulumi.set(self, "allow_subdomains", value)
|
|
329
|
+
|
|
330
|
+
@_builtins.property
|
|
331
|
+
@pulumi.getter(name="allowWildcardCertificates")
|
|
332
|
+
def allow_wildcard_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
333
|
+
"""
|
|
334
|
+
Flag to allow wildcard certificates.
|
|
335
|
+
"""
|
|
336
|
+
return pulumi.get(self, "allow_wildcard_certificates")
|
|
337
|
+
|
|
338
|
+
@allow_wildcard_certificates.setter
|
|
339
|
+
def allow_wildcard_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
340
|
+
pulumi.set(self, "allow_wildcard_certificates", value)
|
|
341
|
+
|
|
342
|
+
@_builtins.property
|
|
343
|
+
@pulumi.getter(name="allowedDomains")
|
|
344
|
+
def allowed_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
345
|
+
"""
|
|
346
|
+
List of allowed domains for certificates
|
|
347
|
+
"""
|
|
348
|
+
return pulumi.get(self, "allowed_domains")
|
|
349
|
+
|
|
350
|
+
@allowed_domains.setter
|
|
351
|
+
def allowed_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
352
|
+
pulumi.set(self, "allowed_domains", value)
|
|
353
|
+
|
|
354
|
+
@_builtins.property
|
|
355
|
+
@pulumi.getter(name="allowedDomainsTemplate")
|
|
356
|
+
def allowed_domains_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
357
|
+
"""
|
|
358
|
+
Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
359
|
+
"""
|
|
360
|
+
return pulumi.get(self, "allowed_domains_template")
|
|
361
|
+
|
|
362
|
+
@allowed_domains_template.setter
|
|
363
|
+
def allowed_domains_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
364
|
+
pulumi.set(self, "allowed_domains_template", value)
|
|
365
|
+
|
|
366
|
+
@_builtins.property
|
|
367
|
+
@pulumi.getter(name="allowedOtherSans")
|
|
368
|
+
def allowed_other_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
369
|
+
"""
|
|
370
|
+
Defines allowed custom SANs
|
|
371
|
+
"""
|
|
372
|
+
return pulumi.get(self, "allowed_other_sans")
|
|
373
|
+
|
|
374
|
+
@allowed_other_sans.setter
|
|
375
|
+
def allowed_other_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
376
|
+
pulumi.set(self, "allowed_other_sans", value)
|
|
377
|
+
|
|
378
|
+
@_builtins.property
|
|
379
|
+
@pulumi.getter(name="allowedSerialNumbers")
|
|
380
|
+
def allowed_serial_numbers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
381
|
+
"""
|
|
382
|
+
An array of allowed serial numbers to put in Subject
|
|
383
|
+
"""
|
|
384
|
+
return pulumi.get(self, "allowed_serial_numbers")
|
|
385
|
+
|
|
386
|
+
@allowed_serial_numbers.setter
|
|
387
|
+
def allowed_serial_numbers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
388
|
+
pulumi.set(self, "allowed_serial_numbers", value)
|
|
389
|
+
|
|
390
|
+
@_builtins.property
|
|
391
|
+
@pulumi.getter(name="allowedUriSans")
|
|
392
|
+
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
393
|
+
"""
|
|
394
|
+
Defines allowed URI SANs
|
|
395
|
+
"""
|
|
396
|
+
return pulumi.get(self, "allowed_uri_sans")
|
|
397
|
+
|
|
398
|
+
@allowed_uri_sans.setter
|
|
399
|
+
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
400
|
+
pulumi.set(self, "allowed_uri_sans", value)
|
|
401
|
+
|
|
402
|
+
@_builtins.property
|
|
403
|
+
@pulumi.getter(name="allowedUriSansTemplate")
|
|
404
|
+
def allowed_uri_sans_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
405
|
+
"""
|
|
406
|
+
Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
407
|
+
"""
|
|
408
|
+
return pulumi.get(self, "allowed_uri_sans_template")
|
|
409
|
+
|
|
410
|
+
@allowed_uri_sans_template.setter
|
|
411
|
+
def allowed_uri_sans_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
412
|
+
pulumi.set(self, "allowed_uri_sans_template", value)
|
|
413
|
+
|
|
414
|
+
@_builtins.property
|
|
415
|
+
@pulumi.getter(name="allowedUserIds")
|
|
416
|
+
def allowed_user_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
417
|
+
"""
|
|
418
|
+
Defines allowed User IDs
|
|
419
|
+
"""
|
|
420
|
+
return pulumi.get(self, "allowed_user_ids")
|
|
421
|
+
|
|
422
|
+
@allowed_user_ids.setter
|
|
423
|
+
def allowed_user_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
424
|
+
pulumi.set(self, "allowed_user_ids", value)
|
|
425
|
+
|
|
426
|
+
@_builtins.property
|
|
427
|
+
@pulumi.getter(name="basicConstraintsValidForNonCa")
|
|
428
|
+
def basic_constraints_valid_for_non_ca(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
429
|
+
"""
|
|
430
|
+
Flag to mark basic constraints valid when issuing non-CA certificates
|
|
431
|
+
"""
|
|
432
|
+
return pulumi.get(self, "basic_constraints_valid_for_non_ca")
|
|
433
|
+
|
|
434
|
+
@basic_constraints_valid_for_non_ca.setter
|
|
435
|
+
def basic_constraints_valid_for_non_ca(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
436
|
+
pulumi.set(self, "basic_constraints_valid_for_non_ca", value)
|
|
437
|
+
|
|
438
|
+
@_builtins.property
|
|
439
|
+
@pulumi.getter(name="clientFlag")
|
|
440
|
+
def client_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
441
|
+
"""
|
|
442
|
+
Flag to specify certificates for client use
|
|
443
|
+
"""
|
|
444
|
+
return pulumi.get(self, "client_flag")
|
|
445
|
+
|
|
446
|
+
@client_flag.setter
|
|
447
|
+
def client_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
448
|
+
pulumi.set(self, "client_flag", value)
|
|
449
|
+
|
|
450
|
+
@_builtins.property
|
|
451
|
+
@pulumi.getter(name="cnValidations")
|
|
452
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
453
|
+
"""
|
|
454
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
455
|
+
"""
|
|
456
|
+
return pulumi.get(self, "cn_validations")
|
|
457
|
+
|
|
458
|
+
@cn_validations.setter
|
|
459
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
460
|
+
pulumi.set(self, "cn_validations", value)
|
|
461
|
+
|
|
462
|
+
@_builtins.property
|
|
463
|
+
@pulumi.getter(name="codeSigningFlag")
|
|
464
|
+
def code_signing_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
465
|
+
"""
|
|
466
|
+
Flag to specify certificates for code signing use
|
|
467
|
+
"""
|
|
468
|
+
return pulumi.get(self, "code_signing_flag")
|
|
469
|
+
|
|
470
|
+
@code_signing_flag.setter
|
|
471
|
+
def code_signing_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
472
|
+
pulumi.set(self, "code_signing_flag", value)
|
|
473
|
+
|
|
474
|
+
@_builtins.property
|
|
475
|
+
@pulumi.getter
|
|
476
|
+
def countries(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
477
|
+
"""
|
|
478
|
+
The country of generated certificates
|
|
479
|
+
"""
|
|
480
|
+
return pulumi.get(self, "countries")
|
|
481
|
+
|
|
482
|
+
@countries.setter
|
|
483
|
+
def countries(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
484
|
+
pulumi.set(self, "countries", value)
|
|
485
|
+
|
|
486
|
+
@_builtins.property
|
|
487
|
+
@pulumi.getter(name="emailProtectionFlag")
|
|
488
|
+
def email_protection_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
489
|
+
"""
|
|
490
|
+
Flag to specify certificates for email protection use
|
|
491
|
+
"""
|
|
492
|
+
return pulumi.get(self, "email_protection_flag")
|
|
493
|
+
|
|
494
|
+
@email_protection_flag.setter
|
|
495
|
+
def email_protection_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
496
|
+
pulumi.set(self, "email_protection_flag", value)
|
|
497
|
+
|
|
498
|
+
@_builtins.property
|
|
499
|
+
@pulumi.getter(name="enforceHostnames")
|
|
500
|
+
def enforce_hostnames(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
501
|
+
"""
|
|
502
|
+
Flag to allow only valid host names
|
|
503
|
+
"""
|
|
504
|
+
return pulumi.get(self, "enforce_hostnames")
|
|
505
|
+
|
|
506
|
+
@enforce_hostnames.setter
|
|
507
|
+
def enforce_hostnames(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
508
|
+
pulumi.set(self, "enforce_hostnames", value)
|
|
509
|
+
|
|
510
|
+
@_builtins.property
|
|
511
|
+
@pulumi.getter(name="extKeyUsageOids")
|
|
512
|
+
def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
513
|
+
"""
|
|
514
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
515
|
+
"""
|
|
516
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
|
517
|
+
|
|
518
|
+
@ext_key_usage_oids.setter
|
|
519
|
+
def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
520
|
+
pulumi.set(self, "ext_key_usage_oids", value)
|
|
521
|
+
|
|
522
|
+
@_builtins.property
|
|
523
|
+
@pulumi.getter(name="extKeyUsages")
|
|
524
|
+
def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
525
|
+
"""
|
|
526
|
+
Specify the allowed extended key usage constraint on issued certificates
|
|
527
|
+
"""
|
|
528
|
+
return pulumi.get(self, "ext_key_usages")
|
|
529
|
+
|
|
530
|
+
@ext_key_usages.setter
|
|
531
|
+
def ext_key_usages(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
532
|
+
pulumi.set(self, "ext_key_usages", value)
|
|
533
|
+
|
|
534
|
+
@_builtins.property
|
|
535
|
+
@pulumi.getter(name="generateLease")
|
|
536
|
+
def generate_lease(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
537
|
+
"""
|
|
538
|
+
Flag to generate leases with certificates
|
|
539
|
+
"""
|
|
540
|
+
return pulumi.get(self, "generate_lease")
|
|
541
|
+
|
|
542
|
+
@generate_lease.setter
|
|
543
|
+
def generate_lease(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
544
|
+
pulumi.set(self, "generate_lease", value)
|
|
545
|
+
|
|
546
|
+
@_builtins.property
|
|
547
|
+
@pulumi.getter(name="issuerRef")
|
|
548
|
+
def issuer_ref(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
549
|
+
"""
|
|
550
|
+
Specifies the default issuer of this request. May
|
|
551
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
552
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
553
|
+
overriding the role's `issuer_ref` value.
|
|
554
|
+
"""
|
|
555
|
+
return pulumi.get(self, "issuer_ref")
|
|
556
|
+
|
|
557
|
+
@issuer_ref.setter
|
|
558
|
+
def issuer_ref(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
559
|
+
pulumi.set(self, "issuer_ref", value)
|
|
560
|
+
|
|
561
|
+
@_builtins.property
|
|
562
|
+
@pulumi.getter(name="keyBits")
|
|
563
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
564
|
+
"""
|
|
565
|
+
The number of bits of generated keys
|
|
566
|
+
"""
|
|
567
|
+
return pulumi.get(self, "key_bits")
|
|
568
|
+
|
|
569
|
+
@key_bits.setter
|
|
570
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
571
|
+
pulumi.set(self, "key_bits", value)
|
|
572
|
+
|
|
573
|
+
@_builtins.property
|
|
574
|
+
@pulumi.getter(name="keyType")
|
|
575
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
576
|
+
"""
|
|
577
|
+
The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
578
|
+
Defaults to `rsa`
|
|
579
|
+
"""
|
|
580
|
+
return pulumi.get(self, "key_type")
|
|
581
|
+
|
|
582
|
+
@key_type.setter
|
|
583
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
584
|
+
pulumi.set(self, "key_type", value)
|
|
585
|
+
|
|
586
|
+
@_builtins.property
|
|
587
|
+
@pulumi.getter(name="keyUsages")
|
|
588
|
+
def key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
589
|
+
"""
|
|
590
|
+
Specify the allowed key usage constraint on issued
|
|
591
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
592
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
593
|
+
"""
|
|
594
|
+
return pulumi.get(self, "key_usages")
|
|
595
|
+
|
|
596
|
+
@key_usages.setter
|
|
597
|
+
def key_usages(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
598
|
+
pulumi.set(self, "key_usages", value)
|
|
599
|
+
|
|
600
|
+
@_builtins.property
|
|
601
|
+
@pulumi.getter
|
|
602
|
+
def localities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
603
|
+
"""
|
|
604
|
+
The locality of generated certificates
|
|
605
|
+
"""
|
|
606
|
+
return pulumi.get(self, "localities")
|
|
607
|
+
|
|
608
|
+
@localities.setter
|
|
609
|
+
def localities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
610
|
+
pulumi.set(self, "localities", value)
|
|
611
|
+
|
|
612
|
+
@_builtins.property
|
|
613
|
+
@pulumi.getter(name="maxTtl")
|
|
614
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
615
|
+
"""
|
|
616
|
+
The maximum lease TTL, in seconds, for the role.
|
|
617
|
+
"""
|
|
618
|
+
return pulumi.get(self, "max_ttl")
|
|
619
|
+
|
|
620
|
+
@max_ttl.setter
|
|
621
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
622
|
+
pulumi.set(self, "max_ttl", value)
|
|
623
|
+
|
|
624
|
+
@_builtins.property
|
|
625
|
+
@pulumi.getter
|
|
626
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
627
|
+
"""
|
|
628
|
+
The name to identify this role within the backend. Must be unique within the backend.
|
|
629
|
+
"""
|
|
630
|
+
return pulumi.get(self, "name")
|
|
631
|
+
|
|
632
|
+
@name.setter
|
|
633
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
634
|
+
pulumi.set(self, "name", value)
|
|
635
|
+
|
|
636
|
+
@_builtins.property
|
|
637
|
+
@pulumi.getter
|
|
638
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
639
|
+
"""
|
|
640
|
+
The namespace to provision the resource in.
|
|
641
|
+
The value should not contain leading or trailing forward slashes.
|
|
642
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
643
|
+
*Available only for Vault Enterprise*.
|
|
644
|
+
"""
|
|
645
|
+
return pulumi.get(self, "namespace")
|
|
646
|
+
|
|
647
|
+
@namespace.setter
|
|
648
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
649
|
+
pulumi.set(self, "namespace", value)
|
|
650
|
+
|
|
651
|
+
@_builtins.property
|
|
652
|
+
@pulumi.getter(name="noStore")
|
|
653
|
+
def no_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
654
|
+
"""
|
|
655
|
+
Flag to not store certificates in the storage backend
|
|
656
|
+
"""
|
|
657
|
+
return pulumi.get(self, "no_store")
|
|
658
|
+
|
|
659
|
+
@no_store.setter
|
|
660
|
+
def no_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
661
|
+
pulumi.set(self, "no_store", value)
|
|
662
|
+
|
|
663
|
+
@_builtins.property
|
|
664
|
+
@pulumi.getter(name="noStoreMetadata")
|
|
665
|
+
def no_store_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
666
|
+
"""
|
|
667
|
+
Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
668
|
+
"""
|
|
669
|
+
return pulumi.get(self, "no_store_metadata")
|
|
670
|
+
|
|
671
|
+
@no_store_metadata.setter
|
|
672
|
+
def no_store_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
673
|
+
pulumi.set(self, "no_store_metadata", value)
|
|
674
|
+
|
|
675
|
+
@_builtins.property
|
|
676
|
+
@pulumi.getter(name="notAfter")
|
|
677
|
+
def not_after(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
678
|
+
"""
|
|
679
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
680
|
+
"""
|
|
681
|
+
return pulumi.get(self, "not_after")
|
|
682
|
+
|
|
683
|
+
@not_after.setter
|
|
684
|
+
def not_after(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
685
|
+
pulumi.set(self, "not_after", value)
|
|
686
|
+
|
|
687
|
+
@_builtins.property
|
|
688
|
+
@pulumi.getter(name="notBeforeDuration")
|
|
689
|
+
def not_before_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
690
|
+
"""
|
|
691
|
+
Specifies the duration by which to backdate the NotBefore property.
|
|
692
|
+
"""
|
|
693
|
+
return pulumi.get(self, "not_before_duration")
|
|
694
|
+
|
|
695
|
+
@not_before_duration.setter
|
|
696
|
+
def not_before_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
697
|
+
pulumi.set(self, "not_before_duration", value)
|
|
698
|
+
|
|
699
|
+
@_builtins.property
|
|
700
|
+
@pulumi.getter(name="organizationUnit")
|
|
701
|
+
def organization_unit(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
702
|
+
"""
|
|
703
|
+
The organization unit of generated certificates
|
|
704
|
+
"""
|
|
705
|
+
return pulumi.get(self, "organization_unit")
|
|
706
|
+
|
|
707
|
+
@organization_unit.setter
|
|
708
|
+
def organization_unit(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
709
|
+
pulumi.set(self, "organization_unit", value)
|
|
710
|
+
|
|
711
|
+
@_builtins.property
|
|
712
|
+
@pulumi.getter
|
|
713
|
+
def organizations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
714
|
+
"""
|
|
715
|
+
The organization of generated certificates
|
|
716
|
+
"""
|
|
717
|
+
return pulumi.get(self, "organizations")
|
|
718
|
+
|
|
719
|
+
@organizations.setter
|
|
720
|
+
def organizations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
721
|
+
pulumi.set(self, "organizations", value)
|
|
722
|
+
|
|
723
|
+
@_builtins.property
|
|
724
|
+
@pulumi.getter(name="policyIdentifier")
|
|
725
|
+
def policy_identifier(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]]:
|
|
726
|
+
"""
|
|
727
|
+
(Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
728
|
+
"""
|
|
729
|
+
return pulumi.get(self, "policy_identifier")
|
|
730
|
+
|
|
731
|
+
@policy_identifier.setter
|
|
732
|
+
def policy_identifier(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]]):
|
|
733
|
+
pulumi.set(self, "policy_identifier", value)
|
|
734
|
+
|
|
735
|
+
@_builtins.property
|
|
736
|
+
@pulumi.getter(name="policyIdentifiers")
|
|
737
|
+
def policy_identifiers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
738
|
+
"""
|
|
739
|
+
Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
740
|
+
"""
|
|
741
|
+
return pulumi.get(self, "policy_identifiers")
|
|
742
|
+
|
|
743
|
+
@policy_identifiers.setter
|
|
744
|
+
def policy_identifiers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
745
|
+
pulumi.set(self, "policy_identifiers", value)
|
|
746
|
+
|
|
747
|
+
@_builtins.property
|
|
748
|
+
@pulumi.getter(name="postalCodes")
|
|
749
|
+
def postal_codes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
750
|
+
"""
|
|
751
|
+
The postal code of generated certificates
|
|
752
|
+
"""
|
|
753
|
+
return pulumi.get(self, "postal_codes")
|
|
754
|
+
|
|
755
|
+
@postal_codes.setter
|
|
756
|
+
def postal_codes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
757
|
+
pulumi.set(self, "postal_codes", value)
|
|
758
|
+
|
|
759
|
+
@_builtins.property
|
|
760
|
+
@pulumi.getter
|
|
761
|
+
def provinces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
762
|
+
"""
|
|
763
|
+
The province of generated certificates
|
|
764
|
+
"""
|
|
765
|
+
return pulumi.get(self, "provinces")
|
|
766
|
+
|
|
767
|
+
@provinces.setter
|
|
768
|
+
def provinces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
769
|
+
pulumi.set(self, "provinces", value)
|
|
770
|
+
|
|
771
|
+
@_builtins.property
|
|
772
|
+
@pulumi.getter(name="requireCn")
|
|
773
|
+
def require_cn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
774
|
+
"""
|
|
775
|
+
Flag to force CN usage
|
|
776
|
+
"""
|
|
777
|
+
return pulumi.get(self, "require_cn")
|
|
778
|
+
|
|
779
|
+
@require_cn.setter
|
|
780
|
+
def require_cn(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
781
|
+
pulumi.set(self, "require_cn", value)
|
|
782
|
+
|
|
783
|
+
@_builtins.property
|
|
784
|
+
@pulumi.getter(name="serialNumberSource")
|
|
785
|
+
def serial_number_source(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
786
|
+
"""
|
|
787
|
+
Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
788
|
+
|
|
789
|
+
Example usage:
|
|
790
|
+
"""
|
|
791
|
+
return pulumi.get(self, "serial_number_source")
|
|
792
|
+
|
|
793
|
+
@serial_number_source.setter
|
|
794
|
+
def serial_number_source(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
795
|
+
pulumi.set(self, "serial_number_source", value)
|
|
796
|
+
|
|
797
|
+
@_builtins.property
|
|
798
|
+
@pulumi.getter(name="serverFlag")
|
|
799
|
+
def server_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
800
|
+
"""
|
|
801
|
+
Flag to specify certificates for server use
|
|
802
|
+
"""
|
|
803
|
+
return pulumi.get(self, "server_flag")
|
|
804
|
+
|
|
805
|
+
@server_flag.setter
|
|
806
|
+
def server_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
807
|
+
pulumi.set(self, "server_flag", value)
|
|
808
|
+
|
|
809
|
+
@_builtins.property
|
|
810
|
+
@pulumi.getter(name="signatureBits")
|
|
811
|
+
def signature_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
812
|
+
"""
|
|
813
|
+
The number of bits to use in the signature algorithm
|
|
814
|
+
"""
|
|
815
|
+
return pulumi.get(self, "signature_bits")
|
|
816
|
+
|
|
817
|
+
@signature_bits.setter
|
|
818
|
+
def signature_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
819
|
+
pulumi.set(self, "signature_bits", value)
|
|
820
|
+
|
|
821
|
+
@_builtins.property
|
|
822
|
+
@pulumi.getter(name="streetAddresses")
|
|
823
|
+
def street_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
824
|
+
"""
|
|
825
|
+
The street address of generated certificates
|
|
826
|
+
"""
|
|
827
|
+
return pulumi.get(self, "street_addresses")
|
|
828
|
+
|
|
829
|
+
@street_addresses.setter
|
|
830
|
+
def street_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
831
|
+
pulumi.set(self, "street_addresses", value)
|
|
832
|
+
|
|
833
|
+
@_builtins.property
|
|
834
|
+
@pulumi.getter
|
|
835
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
836
|
+
"""
|
|
837
|
+
The TTL, in seconds, for any certificate issued against this role.
|
|
838
|
+
"""
|
|
839
|
+
return pulumi.get(self, "ttl")
|
|
840
|
+
|
|
841
|
+
@ttl.setter
|
|
842
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
843
|
+
pulumi.set(self, "ttl", value)
|
|
844
|
+
|
|
845
|
+
@_builtins.property
|
|
846
|
+
@pulumi.getter(name="useCsrCommonName")
|
|
847
|
+
def use_csr_common_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
848
|
+
"""
|
|
849
|
+
Flag to use the CN in the CSR
|
|
850
|
+
"""
|
|
851
|
+
return pulumi.get(self, "use_csr_common_name")
|
|
852
|
+
|
|
853
|
+
@use_csr_common_name.setter
|
|
854
|
+
def use_csr_common_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
855
|
+
pulumi.set(self, "use_csr_common_name", value)
|
|
856
|
+
|
|
857
|
+
@_builtins.property
|
|
858
|
+
@pulumi.getter(name="useCsrSans")
|
|
859
|
+
def use_csr_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
860
|
+
"""
|
|
861
|
+
Flag to use the SANs in the CSR
|
|
862
|
+
"""
|
|
863
|
+
return pulumi.get(self, "use_csr_sans")
|
|
864
|
+
|
|
865
|
+
@use_csr_sans.setter
|
|
866
|
+
def use_csr_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
867
|
+
pulumi.set(self, "use_csr_sans", value)
|
|
868
|
+
|
|
869
|
+
@_builtins.property
|
|
870
|
+
@pulumi.getter(name="usePss")
|
|
871
|
+
def use_pss(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
872
|
+
"""
|
|
873
|
+
Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
874
|
+
"""
|
|
875
|
+
return pulumi.get(self, "use_pss")
|
|
876
|
+
|
|
877
|
+
@use_pss.setter
|
|
878
|
+
def use_pss(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
879
|
+
pulumi.set(self, "use_pss", value)
|
|
880
|
+
|
|
881
|
+
|
|
882
|
+
@pulumi.input_type
|
|
883
|
+
class _SecretBackendRoleState:
|
|
884
|
+
def __init__(__self__, *,
|
|
885
|
+
allow_any_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
886
|
+
allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
887
|
+
allow_glob_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
888
|
+
allow_ip_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
889
|
+
allow_localhost: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
890
|
+
allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
891
|
+
allow_wildcard_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
892
|
+
allowed_domains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
893
|
+
allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
894
|
+
allowed_other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
895
|
+
allowed_serial_numbers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
896
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
897
|
+
allowed_uri_sans_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
898
|
+
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
899
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
900
|
+
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
901
|
+
client_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
902
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
903
|
+
code_signing_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
904
|
+
countries: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
905
|
+
email_protection_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
906
|
+
enforce_hostnames: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
907
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
908
|
+
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
909
|
+
generate_lease: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
910
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
911
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
912
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
913
|
+
key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
914
|
+
localities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
915
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
916
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
917
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
918
|
+
no_store: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
919
|
+
no_store_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
920
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
921
|
+
not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
|
|
922
|
+
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
923
|
+
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
924
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]] = None,
|
|
925
|
+
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
926
|
+
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
927
|
+
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
928
|
+
require_cn: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
929
|
+
serial_number_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
930
|
+
server_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
931
|
+
signature_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
932
|
+
street_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
933
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
934
|
+
use_csr_common_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
935
|
+
use_csr_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
936
|
+
use_pss: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
937
|
+
"""
|
|
938
|
+
Input properties used for looking up and filtering SecretBackendRole resources.
|
|
939
|
+
:param pulumi.Input[_builtins.bool] allow_any_name: Flag to allow any name
|
|
940
|
+
:param pulumi.Input[_builtins.bool] allow_bare_domains: Flag to allow certificates matching the actual domain
|
|
941
|
+
:param pulumi.Input[_builtins.bool] allow_glob_domains: Flag to allow names containing glob patterns.
|
|
942
|
+
:param pulumi.Input[_builtins.bool] allow_ip_sans: Flag to allow IP SANs
|
|
943
|
+
:param pulumi.Input[_builtins.bool] allow_localhost: Flag to allow certificates for localhost
|
|
944
|
+
:param pulumi.Input[_builtins.bool] allow_subdomains: Flag to allow certificates matching subdomains
|
|
945
|
+
:param pulumi.Input[_builtins.bool] allow_wildcard_certificates: Flag to allow wildcard certificates.
|
|
946
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_domains: List of allowed domains for certificates
|
|
947
|
+
:param pulumi.Input[_builtins.bool] allowed_domains_template: Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
948
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_other_sans: Defines allowed custom SANs
|
|
949
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_serial_numbers: An array of allowed serial numbers to put in Subject
|
|
950
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Defines allowed URI SANs
|
|
951
|
+
:param pulumi.Input[_builtins.bool] allowed_uri_sans_template: Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
952
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_user_ids: Defines allowed User IDs
|
|
953
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
954
|
+
:param pulumi.Input[_builtins.bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
|
955
|
+
:param pulumi.Input[_builtins.bool] client_flag: Flag to specify certificates for client use
|
|
956
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
957
|
+
:param pulumi.Input[_builtins.bool] code_signing_flag: Flag to specify certificates for code signing use
|
|
958
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] countries: The country of generated certificates
|
|
959
|
+
:param pulumi.Input[_builtins.bool] email_protection_flag: Flag to specify certificates for email protection use
|
|
960
|
+
:param pulumi.Input[_builtins.bool] enforce_hostnames: Flag to allow only valid host names
|
|
961
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
962
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
|
963
|
+
:param pulumi.Input[_builtins.bool] generate_lease: Flag to generate leases with certificates
|
|
964
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. May
|
|
965
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
966
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
967
|
+
overriding the role's `issuer_ref` value.
|
|
968
|
+
:param pulumi.Input[_builtins.int] key_bits: The number of bits of generated keys
|
|
969
|
+
:param pulumi.Input[_builtins.str] key_type: The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
970
|
+
Defaults to `rsa`
|
|
971
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] key_usages: Specify the allowed key usage constraint on issued
|
|
972
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
973
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
974
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] localities: The locality of generated certificates
|
|
975
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum lease TTL, in seconds, for the role.
|
|
976
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend. Must be unique within the backend.
|
|
977
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
978
|
+
The value should not contain leading or trailing forward slashes.
|
|
979
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
980
|
+
*Available only for Vault Enterprise*.
|
|
981
|
+
:param pulumi.Input[_builtins.bool] no_store: Flag to not store certificates in the storage backend
|
|
982
|
+
:param pulumi.Input[_builtins.bool] no_store_metadata: Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
983
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
984
|
+
:param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
|
985
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organization_unit: The organization unit of generated certificates
|
|
986
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organizations: The organization of generated certificates
|
|
987
|
+
:param pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
988
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
989
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] postal_codes: The postal code of generated certificates
|
|
990
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] provinces: The province of generated certificates
|
|
991
|
+
:param pulumi.Input[_builtins.bool] require_cn: Flag to force CN usage
|
|
992
|
+
:param pulumi.Input[_builtins.str] serial_number_source: Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
993
|
+
|
|
994
|
+
Example usage:
|
|
995
|
+
:param pulumi.Input[_builtins.bool] server_flag: Flag to specify certificates for server use
|
|
996
|
+
:param pulumi.Input[_builtins.int] signature_bits: The number of bits to use in the signature algorithm
|
|
997
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] street_addresses: The street address of generated certificates
|
|
998
|
+
:param pulumi.Input[_builtins.str] ttl: The TTL, in seconds, for any certificate issued against this role.
|
|
999
|
+
:param pulumi.Input[_builtins.bool] use_csr_common_name: Flag to use the CN in the CSR
|
|
1000
|
+
:param pulumi.Input[_builtins.bool] use_csr_sans: Flag to use the SANs in the CSR
|
|
1001
|
+
:param pulumi.Input[_builtins.bool] use_pss: Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
1002
|
+
"""
|
|
1003
|
+
if allow_any_name is not None:
|
|
1004
|
+
pulumi.set(__self__, "allow_any_name", allow_any_name)
|
|
1005
|
+
if allow_bare_domains is not None:
|
|
1006
|
+
pulumi.set(__self__, "allow_bare_domains", allow_bare_domains)
|
|
1007
|
+
if allow_glob_domains is not None:
|
|
1008
|
+
pulumi.set(__self__, "allow_glob_domains", allow_glob_domains)
|
|
1009
|
+
if allow_ip_sans is not None:
|
|
1010
|
+
pulumi.set(__self__, "allow_ip_sans", allow_ip_sans)
|
|
1011
|
+
if allow_localhost is not None:
|
|
1012
|
+
pulumi.set(__self__, "allow_localhost", allow_localhost)
|
|
1013
|
+
if allow_subdomains is not None:
|
|
1014
|
+
pulumi.set(__self__, "allow_subdomains", allow_subdomains)
|
|
1015
|
+
if allow_wildcard_certificates is not None:
|
|
1016
|
+
pulumi.set(__self__, "allow_wildcard_certificates", allow_wildcard_certificates)
|
|
1017
|
+
if allowed_domains is not None:
|
|
1018
|
+
pulumi.set(__self__, "allowed_domains", allowed_domains)
|
|
1019
|
+
if allowed_domains_template is not None:
|
|
1020
|
+
pulumi.set(__self__, "allowed_domains_template", allowed_domains_template)
|
|
1021
|
+
if allowed_other_sans is not None:
|
|
1022
|
+
pulumi.set(__self__, "allowed_other_sans", allowed_other_sans)
|
|
1023
|
+
if allowed_serial_numbers is not None:
|
|
1024
|
+
pulumi.set(__self__, "allowed_serial_numbers", allowed_serial_numbers)
|
|
1025
|
+
if allowed_uri_sans is not None:
|
|
1026
|
+
pulumi.set(__self__, "allowed_uri_sans", allowed_uri_sans)
|
|
1027
|
+
if allowed_uri_sans_template is not None:
|
|
1028
|
+
pulumi.set(__self__, "allowed_uri_sans_template", allowed_uri_sans_template)
|
|
1029
|
+
if allowed_user_ids is not None:
|
|
1030
|
+
pulumi.set(__self__, "allowed_user_ids", allowed_user_ids)
|
|
1031
|
+
if backend is not None:
|
|
1032
|
+
pulumi.set(__self__, "backend", backend)
|
|
1033
|
+
if basic_constraints_valid_for_non_ca is not None:
|
|
1034
|
+
pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
|
|
1035
|
+
if client_flag is not None:
|
|
1036
|
+
pulumi.set(__self__, "client_flag", client_flag)
|
|
1037
|
+
if cn_validations is not None:
|
|
1038
|
+
pulumi.set(__self__, "cn_validations", cn_validations)
|
|
1039
|
+
if code_signing_flag is not None:
|
|
1040
|
+
pulumi.set(__self__, "code_signing_flag", code_signing_flag)
|
|
1041
|
+
if countries is not None:
|
|
1042
|
+
pulumi.set(__self__, "countries", countries)
|
|
1043
|
+
if email_protection_flag is not None:
|
|
1044
|
+
pulumi.set(__self__, "email_protection_flag", email_protection_flag)
|
|
1045
|
+
if enforce_hostnames is not None:
|
|
1046
|
+
pulumi.set(__self__, "enforce_hostnames", enforce_hostnames)
|
|
1047
|
+
if ext_key_usage_oids is not None:
|
|
1048
|
+
pulumi.set(__self__, "ext_key_usage_oids", ext_key_usage_oids)
|
|
1049
|
+
if ext_key_usages is not None:
|
|
1050
|
+
pulumi.set(__self__, "ext_key_usages", ext_key_usages)
|
|
1051
|
+
if generate_lease is not None:
|
|
1052
|
+
pulumi.set(__self__, "generate_lease", generate_lease)
|
|
1053
|
+
if issuer_ref is not None:
|
|
1054
|
+
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
|
1055
|
+
if key_bits is not None:
|
|
1056
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
|
1057
|
+
if key_type is not None:
|
|
1058
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
1059
|
+
if key_usages is not None:
|
|
1060
|
+
pulumi.set(__self__, "key_usages", key_usages)
|
|
1061
|
+
if localities is not None:
|
|
1062
|
+
pulumi.set(__self__, "localities", localities)
|
|
1063
|
+
if max_ttl is not None:
|
|
1064
|
+
pulumi.set(__self__, "max_ttl", max_ttl)
|
|
1065
|
+
if name is not None:
|
|
1066
|
+
pulumi.set(__self__, "name", name)
|
|
1067
|
+
if namespace is not None:
|
|
1068
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1069
|
+
if no_store is not None:
|
|
1070
|
+
pulumi.set(__self__, "no_store", no_store)
|
|
1071
|
+
if no_store_metadata is not None:
|
|
1072
|
+
pulumi.set(__self__, "no_store_metadata", no_store_metadata)
|
|
1073
|
+
if not_after is not None:
|
|
1074
|
+
pulumi.set(__self__, "not_after", not_after)
|
|
1075
|
+
if not_before_duration is not None:
|
|
1076
|
+
pulumi.set(__self__, "not_before_duration", not_before_duration)
|
|
1077
|
+
if organization_unit is not None:
|
|
1078
|
+
pulumi.set(__self__, "organization_unit", organization_unit)
|
|
1079
|
+
if organizations is not None:
|
|
1080
|
+
pulumi.set(__self__, "organizations", organizations)
|
|
1081
|
+
if policy_identifier is not None:
|
|
1082
|
+
pulumi.set(__self__, "policy_identifier", policy_identifier)
|
|
1083
|
+
if policy_identifiers is not None:
|
|
1084
|
+
pulumi.set(__self__, "policy_identifiers", policy_identifiers)
|
|
1085
|
+
if postal_codes is not None:
|
|
1086
|
+
pulumi.set(__self__, "postal_codes", postal_codes)
|
|
1087
|
+
if provinces is not None:
|
|
1088
|
+
pulumi.set(__self__, "provinces", provinces)
|
|
1089
|
+
if require_cn is not None:
|
|
1090
|
+
pulumi.set(__self__, "require_cn", require_cn)
|
|
1091
|
+
if serial_number_source is not None:
|
|
1092
|
+
pulumi.set(__self__, "serial_number_source", serial_number_source)
|
|
1093
|
+
if server_flag is not None:
|
|
1094
|
+
pulumi.set(__self__, "server_flag", server_flag)
|
|
1095
|
+
if signature_bits is not None:
|
|
1096
|
+
pulumi.set(__self__, "signature_bits", signature_bits)
|
|
1097
|
+
if street_addresses is not None:
|
|
1098
|
+
pulumi.set(__self__, "street_addresses", street_addresses)
|
|
1099
|
+
if ttl is not None:
|
|
1100
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
1101
|
+
if use_csr_common_name is not None:
|
|
1102
|
+
pulumi.set(__self__, "use_csr_common_name", use_csr_common_name)
|
|
1103
|
+
if use_csr_sans is not None:
|
|
1104
|
+
pulumi.set(__self__, "use_csr_sans", use_csr_sans)
|
|
1105
|
+
if use_pss is not None:
|
|
1106
|
+
pulumi.set(__self__, "use_pss", use_pss)
|
|
1107
|
+
|
|
1108
|
+
@_builtins.property
|
|
1109
|
+
@pulumi.getter(name="allowAnyName")
|
|
1110
|
+
def allow_any_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1111
|
+
"""
|
|
1112
|
+
Flag to allow any name
|
|
1113
|
+
"""
|
|
1114
|
+
return pulumi.get(self, "allow_any_name")
|
|
1115
|
+
|
|
1116
|
+
@allow_any_name.setter
|
|
1117
|
+
def allow_any_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1118
|
+
pulumi.set(self, "allow_any_name", value)
|
|
1119
|
+
|
|
1120
|
+
@_builtins.property
|
|
1121
|
+
@pulumi.getter(name="allowBareDomains")
|
|
1122
|
+
def allow_bare_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1123
|
+
"""
|
|
1124
|
+
Flag to allow certificates matching the actual domain
|
|
1125
|
+
"""
|
|
1126
|
+
return pulumi.get(self, "allow_bare_domains")
|
|
1127
|
+
|
|
1128
|
+
@allow_bare_domains.setter
|
|
1129
|
+
def allow_bare_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1130
|
+
pulumi.set(self, "allow_bare_domains", value)
|
|
1131
|
+
|
|
1132
|
+
@_builtins.property
|
|
1133
|
+
@pulumi.getter(name="allowGlobDomains")
|
|
1134
|
+
def allow_glob_domains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1135
|
+
"""
|
|
1136
|
+
Flag to allow names containing glob patterns.
|
|
1137
|
+
"""
|
|
1138
|
+
return pulumi.get(self, "allow_glob_domains")
|
|
1139
|
+
|
|
1140
|
+
@allow_glob_domains.setter
|
|
1141
|
+
def allow_glob_domains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1142
|
+
pulumi.set(self, "allow_glob_domains", value)
|
|
1143
|
+
|
|
1144
|
+
@_builtins.property
|
|
1145
|
+
@pulumi.getter(name="allowIpSans")
|
|
1146
|
+
def allow_ip_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1147
|
+
"""
|
|
1148
|
+
Flag to allow IP SANs
|
|
1149
|
+
"""
|
|
1150
|
+
return pulumi.get(self, "allow_ip_sans")
|
|
1151
|
+
|
|
1152
|
+
@allow_ip_sans.setter
|
|
1153
|
+
def allow_ip_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1154
|
+
pulumi.set(self, "allow_ip_sans", value)
|
|
1155
|
+
|
|
1156
|
+
@_builtins.property
|
|
1157
|
+
@pulumi.getter(name="allowLocalhost")
|
|
1158
|
+
def allow_localhost(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1159
|
+
"""
|
|
1160
|
+
Flag to allow certificates for localhost
|
|
1161
|
+
"""
|
|
1162
|
+
return pulumi.get(self, "allow_localhost")
|
|
1163
|
+
|
|
1164
|
+
@allow_localhost.setter
|
|
1165
|
+
def allow_localhost(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1166
|
+
pulumi.set(self, "allow_localhost", value)
|
|
1167
|
+
|
|
1168
|
+
@_builtins.property
|
|
1169
|
+
@pulumi.getter(name="allowSubdomains")
|
|
1170
|
+
def allow_subdomains(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1171
|
+
"""
|
|
1172
|
+
Flag to allow certificates matching subdomains
|
|
1173
|
+
"""
|
|
1174
|
+
return pulumi.get(self, "allow_subdomains")
|
|
1175
|
+
|
|
1176
|
+
@allow_subdomains.setter
|
|
1177
|
+
def allow_subdomains(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1178
|
+
pulumi.set(self, "allow_subdomains", value)
|
|
1179
|
+
|
|
1180
|
+
@_builtins.property
|
|
1181
|
+
@pulumi.getter(name="allowWildcardCertificates")
|
|
1182
|
+
def allow_wildcard_certificates(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1183
|
+
"""
|
|
1184
|
+
Flag to allow wildcard certificates.
|
|
1185
|
+
"""
|
|
1186
|
+
return pulumi.get(self, "allow_wildcard_certificates")
|
|
1187
|
+
|
|
1188
|
+
@allow_wildcard_certificates.setter
|
|
1189
|
+
def allow_wildcard_certificates(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1190
|
+
pulumi.set(self, "allow_wildcard_certificates", value)
|
|
1191
|
+
|
|
1192
|
+
@_builtins.property
|
|
1193
|
+
@pulumi.getter(name="allowedDomains")
|
|
1194
|
+
def allowed_domains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1195
|
+
"""
|
|
1196
|
+
List of allowed domains for certificates
|
|
1197
|
+
"""
|
|
1198
|
+
return pulumi.get(self, "allowed_domains")
|
|
1199
|
+
|
|
1200
|
+
@allowed_domains.setter
|
|
1201
|
+
def allowed_domains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1202
|
+
pulumi.set(self, "allowed_domains", value)
|
|
1203
|
+
|
|
1204
|
+
@_builtins.property
|
|
1205
|
+
@pulumi.getter(name="allowedDomainsTemplate")
|
|
1206
|
+
def allowed_domains_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1207
|
+
"""
|
|
1208
|
+
Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
1209
|
+
"""
|
|
1210
|
+
return pulumi.get(self, "allowed_domains_template")
|
|
1211
|
+
|
|
1212
|
+
@allowed_domains_template.setter
|
|
1213
|
+
def allowed_domains_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1214
|
+
pulumi.set(self, "allowed_domains_template", value)
|
|
1215
|
+
|
|
1216
|
+
@_builtins.property
|
|
1217
|
+
@pulumi.getter(name="allowedOtherSans")
|
|
1218
|
+
def allowed_other_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1219
|
+
"""
|
|
1220
|
+
Defines allowed custom SANs
|
|
1221
|
+
"""
|
|
1222
|
+
return pulumi.get(self, "allowed_other_sans")
|
|
1223
|
+
|
|
1224
|
+
@allowed_other_sans.setter
|
|
1225
|
+
def allowed_other_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1226
|
+
pulumi.set(self, "allowed_other_sans", value)
|
|
1227
|
+
|
|
1228
|
+
@_builtins.property
|
|
1229
|
+
@pulumi.getter(name="allowedSerialNumbers")
|
|
1230
|
+
def allowed_serial_numbers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1231
|
+
"""
|
|
1232
|
+
An array of allowed serial numbers to put in Subject
|
|
1233
|
+
"""
|
|
1234
|
+
return pulumi.get(self, "allowed_serial_numbers")
|
|
1235
|
+
|
|
1236
|
+
@allowed_serial_numbers.setter
|
|
1237
|
+
def allowed_serial_numbers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1238
|
+
pulumi.set(self, "allowed_serial_numbers", value)
|
|
1239
|
+
|
|
1240
|
+
@_builtins.property
|
|
1241
|
+
@pulumi.getter(name="allowedUriSans")
|
|
1242
|
+
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1243
|
+
"""
|
|
1244
|
+
Defines allowed URI SANs
|
|
1245
|
+
"""
|
|
1246
|
+
return pulumi.get(self, "allowed_uri_sans")
|
|
1247
|
+
|
|
1248
|
+
@allowed_uri_sans.setter
|
|
1249
|
+
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1250
|
+
pulumi.set(self, "allowed_uri_sans", value)
|
|
1251
|
+
|
|
1252
|
+
@_builtins.property
|
|
1253
|
+
@pulumi.getter(name="allowedUriSansTemplate")
|
|
1254
|
+
def allowed_uri_sans_template(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1255
|
+
"""
|
|
1256
|
+
Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
1257
|
+
"""
|
|
1258
|
+
return pulumi.get(self, "allowed_uri_sans_template")
|
|
1259
|
+
|
|
1260
|
+
@allowed_uri_sans_template.setter
|
|
1261
|
+
def allowed_uri_sans_template(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1262
|
+
pulumi.set(self, "allowed_uri_sans_template", value)
|
|
1263
|
+
|
|
1264
|
+
@_builtins.property
|
|
1265
|
+
@pulumi.getter(name="allowedUserIds")
|
|
1266
|
+
def allowed_user_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1267
|
+
"""
|
|
1268
|
+
Defines allowed User IDs
|
|
1269
|
+
"""
|
|
1270
|
+
return pulumi.get(self, "allowed_user_ids")
|
|
1271
|
+
|
|
1272
|
+
@allowed_user_ids.setter
|
|
1273
|
+
def allowed_user_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1274
|
+
pulumi.set(self, "allowed_user_ids", value)
|
|
1275
|
+
|
|
1276
|
+
@_builtins.property
|
|
1277
|
+
@pulumi.getter
|
|
1278
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1279
|
+
"""
|
|
1280
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
1281
|
+
"""
|
|
1282
|
+
return pulumi.get(self, "backend")
|
|
1283
|
+
|
|
1284
|
+
@backend.setter
|
|
1285
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1286
|
+
pulumi.set(self, "backend", value)
|
|
1287
|
+
|
|
1288
|
+
@_builtins.property
|
|
1289
|
+
@pulumi.getter(name="basicConstraintsValidForNonCa")
|
|
1290
|
+
def basic_constraints_valid_for_non_ca(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1291
|
+
"""
|
|
1292
|
+
Flag to mark basic constraints valid when issuing non-CA certificates
|
|
1293
|
+
"""
|
|
1294
|
+
return pulumi.get(self, "basic_constraints_valid_for_non_ca")
|
|
1295
|
+
|
|
1296
|
+
@basic_constraints_valid_for_non_ca.setter
|
|
1297
|
+
def basic_constraints_valid_for_non_ca(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1298
|
+
pulumi.set(self, "basic_constraints_valid_for_non_ca", value)
|
|
1299
|
+
|
|
1300
|
+
@_builtins.property
|
|
1301
|
+
@pulumi.getter(name="clientFlag")
|
|
1302
|
+
def client_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1303
|
+
"""
|
|
1304
|
+
Flag to specify certificates for client use
|
|
1305
|
+
"""
|
|
1306
|
+
return pulumi.get(self, "client_flag")
|
|
1307
|
+
|
|
1308
|
+
@client_flag.setter
|
|
1309
|
+
def client_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1310
|
+
pulumi.set(self, "client_flag", value)
|
|
1311
|
+
|
|
1312
|
+
@_builtins.property
|
|
1313
|
+
@pulumi.getter(name="cnValidations")
|
|
1314
|
+
def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1315
|
+
"""
|
|
1316
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
1317
|
+
"""
|
|
1318
|
+
return pulumi.get(self, "cn_validations")
|
|
1319
|
+
|
|
1320
|
+
@cn_validations.setter
|
|
1321
|
+
def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1322
|
+
pulumi.set(self, "cn_validations", value)
|
|
1323
|
+
|
|
1324
|
+
@_builtins.property
|
|
1325
|
+
@pulumi.getter(name="codeSigningFlag")
|
|
1326
|
+
def code_signing_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1327
|
+
"""
|
|
1328
|
+
Flag to specify certificates for code signing use
|
|
1329
|
+
"""
|
|
1330
|
+
return pulumi.get(self, "code_signing_flag")
|
|
1331
|
+
|
|
1332
|
+
@code_signing_flag.setter
|
|
1333
|
+
def code_signing_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1334
|
+
pulumi.set(self, "code_signing_flag", value)
|
|
1335
|
+
|
|
1336
|
+
@_builtins.property
|
|
1337
|
+
@pulumi.getter
|
|
1338
|
+
def countries(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1339
|
+
"""
|
|
1340
|
+
The country of generated certificates
|
|
1341
|
+
"""
|
|
1342
|
+
return pulumi.get(self, "countries")
|
|
1343
|
+
|
|
1344
|
+
@countries.setter
|
|
1345
|
+
def countries(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1346
|
+
pulumi.set(self, "countries", value)
|
|
1347
|
+
|
|
1348
|
+
@_builtins.property
|
|
1349
|
+
@pulumi.getter(name="emailProtectionFlag")
|
|
1350
|
+
def email_protection_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1351
|
+
"""
|
|
1352
|
+
Flag to specify certificates for email protection use
|
|
1353
|
+
"""
|
|
1354
|
+
return pulumi.get(self, "email_protection_flag")
|
|
1355
|
+
|
|
1356
|
+
@email_protection_flag.setter
|
|
1357
|
+
def email_protection_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1358
|
+
pulumi.set(self, "email_protection_flag", value)
|
|
1359
|
+
|
|
1360
|
+
@_builtins.property
|
|
1361
|
+
@pulumi.getter(name="enforceHostnames")
|
|
1362
|
+
def enforce_hostnames(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1363
|
+
"""
|
|
1364
|
+
Flag to allow only valid host names
|
|
1365
|
+
"""
|
|
1366
|
+
return pulumi.get(self, "enforce_hostnames")
|
|
1367
|
+
|
|
1368
|
+
@enforce_hostnames.setter
|
|
1369
|
+
def enforce_hostnames(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1370
|
+
pulumi.set(self, "enforce_hostnames", value)
|
|
1371
|
+
|
|
1372
|
+
@_builtins.property
|
|
1373
|
+
@pulumi.getter(name="extKeyUsageOids")
|
|
1374
|
+
def ext_key_usage_oids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1375
|
+
"""
|
|
1376
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
1377
|
+
"""
|
|
1378
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
|
1379
|
+
|
|
1380
|
+
@ext_key_usage_oids.setter
|
|
1381
|
+
def ext_key_usage_oids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1382
|
+
pulumi.set(self, "ext_key_usage_oids", value)
|
|
1383
|
+
|
|
1384
|
+
@_builtins.property
|
|
1385
|
+
@pulumi.getter(name="extKeyUsages")
|
|
1386
|
+
def ext_key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1387
|
+
"""
|
|
1388
|
+
Specify the allowed extended key usage constraint on issued certificates
|
|
1389
|
+
"""
|
|
1390
|
+
return pulumi.get(self, "ext_key_usages")
|
|
1391
|
+
|
|
1392
|
+
@ext_key_usages.setter
|
|
1393
|
+
def ext_key_usages(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1394
|
+
pulumi.set(self, "ext_key_usages", value)
|
|
1395
|
+
|
|
1396
|
+
@_builtins.property
|
|
1397
|
+
@pulumi.getter(name="generateLease")
|
|
1398
|
+
def generate_lease(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1399
|
+
"""
|
|
1400
|
+
Flag to generate leases with certificates
|
|
1401
|
+
"""
|
|
1402
|
+
return pulumi.get(self, "generate_lease")
|
|
1403
|
+
|
|
1404
|
+
@generate_lease.setter
|
|
1405
|
+
def generate_lease(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1406
|
+
pulumi.set(self, "generate_lease", value)
|
|
1407
|
+
|
|
1408
|
+
@_builtins.property
|
|
1409
|
+
@pulumi.getter(name="issuerRef")
|
|
1410
|
+
def issuer_ref(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1411
|
+
"""
|
|
1412
|
+
Specifies the default issuer of this request. May
|
|
1413
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
1414
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
1415
|
+
overriding the role's `issuer_ref` value.
|
|
1416
|
+
"""
|
|
1417
|
+
return pulumi.get(self, "issuer_ref")
|
|
1418
|
+
|
|
1419
|
+
@issuer_ref.setter
|
|
1420
|
+
def issuer_ref(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1421
|
+
pulumi.set(self, "issuer_ref", value)
|
|
1422
|
+
|
|
1423
|
+
@_builtins.property
|
|
1424
|
+
@pulumi.getter(name="keyBits")
|
|
1425
|
+
def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
1426
|
+
"""
|
|
1427
|
+
The number of bits of generated keys
|
|
1428
|
+
"""
|
|
1429
|
+
return pulumi.get(self, "key_bits")
|
|
1430
|
+
|
|
1431
|
+
@key_bits.setter
|
|
1432
|
+
def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
1433
|
+
pulumi.set(self, "key_bits", value)
|
|
1434
|
+
|
|
1435
|
+
@_builtins.property
|
|
1436
|
+
@pulumi.getter(name="keyType")
|
|
1437
|
+
def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1438
|
+
"""
|
|
1439
|
+
The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
1440
|
+
Defaults to `rsa`
|
|
1441
|
+
"""
|
|
1442
|
+
return pulumi.get(self, "key_type")
|
|
1443
|
+
|
|
1444
|
+
@key_type.setter
|
|
1445
|
+
def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1446
|
+
pulumi.set(self, "key_type", value)
|
|
1447
|
+
|
|
1448
|
+
@_builtins.property
|
|
1449
|
+
@pulumi.getter(name="keyUsages")
|
|
1450
|
+
def key_usages(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1451
|
+
"""
|
|
1452
|
+
Specify the allowed key usage constraint on issued
|
|
1453
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
1454
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
1455
|
+
"""
|
|
1456
|
+
return pulumi.get(self, "key_usages")
|
|
1457
|
+
|
|
1458
|
+
@key_usages.setter
|
|
1459
|
+
def key_usages(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1460
|
+
pulumi.set(self, "key_usages", value)
|
|
1461
|
+
|
|
1462
|
+
@_builtins.property
|
|
1463
|
+
@pulumi.getter
|
|
1464
|
+
def localities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1465
|
+
"""
|
|
1466
|
+
The locality of generated certificates
|
|
1467
|
+
"""
|
|
1468
|
+
return pulumi.get(self, "localities")
|
|
1469
|
+
|
|
1470
|
+
@localities.setter
|
|
1471
|
+
def localities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1472
|
+
pulumi.set(self, "localities", value)
|
|
1473
|
+
|
|
1474
|
+
@_builtins.property
|
|
1475
|
+
@pulumi.getter(name="maxTtl")
|
|
1476
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1477
|
+
"""
|
|
1478
|
+
The maximum lease TTL, in seconds, for the role.
|
|
1479
|
+
"""
|
|
1480
|
+
return pulumi.get(self, "max_ttl")
|
|
1481
|
+
|
|
1482
|
+
@max_ttl.setter
|
|
1483
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1484
|
+
pulumi.set(self, "max_ttl", value)
|
|
1485
|
+
|
|
1486
|
+
@_builtins.property
|
|
1487
|
+
@pulumi.getter
|
|
1488
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1489
|
+
"""
|
|
1490
|
+
The name to identify this role within the backend. Must be unique within the backend.
|
|
1491
|
+
"""
|
|
1492
|
+
return pulumi.get(self, "name")
|
|
1493
|
+
|
|
1494
|
+
@name.setter
|
|
1495
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1496
|
+
pulumi.set(self, "name", value)
|
|
1497
|
+
|
|
1498
|
+
@_builtins.property
|
|
1499
|
+
@pulumi.getter
|
|
1500
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1501
|
+
"""
|
|
1502
|
+
The namespace to provision the resource in.
|
|
1503
|
+
The value should not contain leading or trailing forward slashes.
|
|
1504
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1505
|
+
*Available only for Vault Enterprise*.
|
|
1506
|
+
"""
|
|
1507
|
+
return pulumi.get(self, "namespace")
|
|
1508
|
+
|
|
1509
|
+
@namespace.setter
|
|
1510
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1511
|
+
pulumi.set(self, "namespace", value)
|
|
1512
|
+
|
|
1513
|
+
@_builtins.property
|
|
1514
|
+
@pulumi.getter(name="noStore")
|
|
1515
|
+
def no_store(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1516
|
+
"""
|
|
1517
|
+
Flag to not store certificates in the storage backend
|
|
1518
|
+
"""
|
|
1519
|
+
return pulumi.get(self, "no_store")
|
|
1520
|
+
|
|
1521
|
+
@no_store.setter
|
|
1522
|
+
def no_store(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1523
|
+
pulumi.set(self, "no_store", value)
|
|
1524
|
+
|
|
1525
|
+
@_builtins.property
|
|
1526
|
+
@pulumi.getter(name="noStoreMetadata")
|
|
1527
|
+
def no_store_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1528
|
+
"""
|
|
1529
|
+
Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
1530
|
+
"""
|
|
1531
|
+
return pulumi.get(self, "no_store_metadata")
|
|
1532
|
+
|
|
1533
|
+
@no_store_metadata.setter
|
|
1534
|
+
def no_store_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1535
|
+
pulumi.set(self, "no_store_metadata", value)
|
|
1536
|
+
|
|
1537
|
+
@_builtins.property
|
|
1538
|
+
@pulumi.getter(name="notAfter")
|
|
1539
|
+
def not_after(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1540
|
+
"""
|
|
1541
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
1542
|
+
"""
|
|
1543
|
+
return pulumi.get(self, "not_after")
|
|
1544
|
+
|
|
1545
|
+
@not_after.setter
|
|
1546
|
+
def not_after(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1547
|
+
pulumi.set(self, "not_after", value)
|
|
1548
|
+
|
|
1549
|
+
@_builtins.property
|
|
1550
|
+
@pulumi.getter(name="notBeforeDuration")
|
|
1551
|
+
def not_before_duration(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1552
|
+
"""
|
|
1553
|
+
Specifies the duration by which to backdate the NotBefore property.
|
|
1554
|
+
"""
|
|
1555
|
+
return pulumi.get(self, "not_before_duration")
|
|
1556
|
+
|
|
1557
|
+
@not_before_duration.setter
|
|
1558
|
+
def not_before_duration(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1559
|
+
pulumi.set(self, "not_before_duration", value)
|
|
1560
|
+
|
|
1561
|
+
@_builtins.property
|
|
1562
|
+
@pulumi.getter(name="organizationUnit")
|
|
1563
|
+
def organization_unit(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1564
|
+
"""
|
|
1565
|
+
The organization unit of generated certificates
|
|
1566
|
+
"""
|
|
1567
|
+
return pulumi.get(self, "organization_unit")
|
|
1568
|
+
|
|
1569
|
+
@organization_unit.setter
|
|
1570
|
+
def organization_unit(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1571
|
+
pulumi.set(self, "organization_unit", value)
|
|
1572
|
+
|
|
1573
|
+
@_builtins.property
|
|
1574
|
+
@pulumi.getter
|
|
1575
|
+
def organizations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1576
|
+
"""
|
|
1577
|
+
The organization of generated certificates
|
|
1578
|
+
"""
|
|
1579
|
+
return pulumi.get(self, "organizations")
|
|
1580
|
+
|
|
1581
|
+
@organizations.setter
|
|
1582
|
+
def organizations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1583
|
+
pulumi.set(self, "organizations", value)
|
|
1584
|
+
|
|
1585
|
+
@_builtins.property
|
|
1586
|
+
@pulumi.getter(name="policyIdentifier")
|
|
1587
|
+
def policy_identifier(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]]:
|
|
1588
|
+
"""
|
|
1589
|
+
(Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
1590
|
+
"""
|
|
1591
|
+
return pulumi.get(self, "policy_identifier")
|
|
1592
|
+
|
|
1593
|
+
@policy_identifier.setter
|
|
1594
|
+
def policy_identifier(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRolePolicyIdentifierArgs']]]]):
|
|
1595
|
+
pulumi.set(self, "policy_identifier", value)
|
|
1596
|
+
|
|
1597
|
+
@_builtins.property
|
|
1598
|
+
@pulumi.getter(name="policyIdentifiers")
|
|
1599
|
+
def policy_identifiers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1600
|
+
"""
|
|
1601
|
+
Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
1602
|
+
"""
|
|
1603
|
+
return pulumi.get(self, "policy_identifiers")
|
|
1604
|
+
|
|
1605
|
+
@policy_identifiers.setter
|
|
1606
|
+
def policy_identifiers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1607
|
+
pulumi.set(self, "policy_identifiers", value)
|
|
1608
|
+
|
|
1609
|
+
@_builtins.property
|
|
1610
|
+
@pulumi.getter(name="postalCodes")
|
|
1611
|
+
def postal_codes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1612
|
+
"""
|
|
1613
|
+
The postal code of generated certificates
|
|
1614
|
+
"""
|
|
1615
|
+
return pulumi.get(self, "postal_codes")
|
|
1616
|
+
|
|
1617
|
+
@postal_codes.setter
|
|
1618
|
+
def postal_codes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1619
|
+
pulumi.set(self, "postal_codes", value)
|
|
1620
|
+
|
|
1621
|
+
@_builtins.property
|
|
1622
|
+
@pulumi.getter
|
|
1623
|
+
def provinces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1624
|
+
"""
|
|
1625
|
+
The province of generated certificates
|
|
1626
|
+
"""
|
|
1627
|
+
return pulumi.get(self, "provinces")
|
|
1628
|
+
|
|
1629
|
+
@provinces.setter
|
|
1630
|
+
def provinces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1631
|
+
pulumi.set(self, "provinces", value)
|
|
1632
|
+
|
|
1633
|
+
@_builtins.property
|
|
1634
|
+
@pulumi.getter(name="requireCn")
|
|
1635
|
+
def require_cn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1636
|
+
"""
|
|
1637
|
+
Flag to force CN usage
|
|
1638
|
+
"""
|
|
1639
|
+
return pulumi.get(self, "require_cn")
|
|
1640
|
+
|
|
1641
|
+
@require_cn.setter
|
|
1642
|
+
def require_cn(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1643
|
+
pulumi.set(self, "require_cn", value)
|
|
1644
|
+
|
|
1645
|
+
@_builtins.property
|
|
1646
|
+
@pulumi.getter(name="serialNumberSource")
|
|
1647
|
+
def serial_number_source(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1648
|
+
"""
|
|
1649
|
+
Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
1650
|
+
|
|
1651
|
+
Example usage:
|
|
1652
|
+
"""
|
|
1653
|
+
return pulumi.get(self, "serial_number_source")
|
|
1654
|
+
|
|
1655
|
+
@serial_number_source.setter
|
|
1656
|
+
def serial_number_source(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1657
|
+
pulumi.set(self, "serial_number_source", value)
|
|
1658
|
+
|
|
1659
|
+
@_builtins.property
|
|
1660
|
+
@pulumi.getter(name="serverFlag")
|
|
1661
|
+
def server_flag(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1662
|
+
"""
|
|
1663
|
+
Flag to specify certificates for server use
|
|
1664
|
+
"""
|
|
1665
|
+
return pulumi.get(self, "server_flag")
|
|
1666
|
+
|
|
1667
|
+
@server_flag.setter
|
|
1668
|
+
def server_flag(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1669
|
+
pulumi.set(self, "server_flag", value)
|
|
1670
|
+
|
|
1671
|
+
@_builtins.property
|
|
1672
|
+
@pulumi.getter(name="signatureBits")
|
|
1673
|
+
def signature_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
1674
|
+
"""
|
|
1675
|
+
The number of bits to use in the signature algorithm
|
|
1676
|
+
"""
|
|
1677
|
+
return pulumi.get(self, "signature_bits")
|
|
1678
|
+
|
|
1679
|
+
@signature_bits.setter
|
|
1680
|
+
def signature_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
1681
|
+
pulumi.set(self, "signature_bits", value)
|
|
1682
|
+
|
|
1683
|
+
@_builtins.property
|
|
1684
|
+
@pulumi.getter(name="streetAddresses")
|
|
1685
|
+
def street_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
1686
|
+
"""
|
|
1687
|
+
The street address of generated certificates
|
|
1688
|
+
"""
|
|
1689
|
+
return pulumi.get(self, "street_addresses")
|
|
1690
|
+
|
|
1691
|
+
@street_addresses.setter
|
|
1692
|
+
def street_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
1693
|
+
pulumi.set(self, "street_addresses", value)
|
|
1694
|
+
|
|
1695
|
+
@_builtins.property
|
|
1696
|
+
@pulumi.getter
|
|
1697
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1698
|
+
"""
|
|
1699
|
+
The TTL, in seconds, for any certificate issued against this role.
|
|
1700
|
+
"""
|
|
1701
|
+
return pulumi.get(self, "ttl")
|
|
1702
|
+
|
|
1703
|
+
@ttl.setter
|
|
1704
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1705
|
+
pulumi.set(self, "ttl", value)
|
|
1706
|
+
|
|
1707
|
+
@_builtins.property
|
|
1708
|
+
@pulumi.getter(name="useCsrCommonName")
|
|
1709
|
+
def use_csr_common_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1710
|
+
"""
|
|
1711
|
+
Flag to use the CN in the CSR
|
|
1712
|
+
"""
|
|
1713
|
+
return pulumi.get(self, "use_csr_common_name")
|
|
1714
|
+
|
|
1715
|
+
@use_csr_common_name.setter
|
|
1716
|
+
def use_csr_common_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1717
|
+
pulumi.set(self, "use_csr_common_name", value)
|
|
1718
|
+
|
|
1719
|
+
@_builtins.property
|
|
1720
|
+
@pulumi.getter(name="useCsrSans")
|
|
1721
|
+
def use_csr_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1722
|
+
"""
|
|
1723
|
+
Flag to use the SANs in the CSR
|
|
1724
|
+
"""
|
|
1725
|
+
return pulumi.get(self, "use_csr_sans")
|
|
1726
|
+
|
|
1727
|
+
@use_csr_sans.setter
|
|
1728
|
+
def use_csr_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1729
|
+
pulumi.set(self, "use_csr_sans", value)
|
|
1730
|
+
|
|
1731
|
+
@_builtins.property
|
|
1732
|
+
@pulumi.getter(name="usePss")
|
|
1733
|
+
def use_pss(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1734
|
+
"""
|
|
1735
|
+
Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
1736
|
+
"""
|
|
1737
|
+
return pulumi.get(self, "use_pss")
|
|
1738
|
+
|
|
1739
|
+
@use_pss.setter
|
|
1740
|
+
def use_pss(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1741
|
+
pulumi.set(self, "use_pss", value)
|
|
1742
|
+
|
|
1743
|
+
|
|
1744
|
+
@pulumi.type_token("vault:pkiSecret/secretBackendRole:SecretBackendRole")
|
|
1745
|
+
class SecretBackendRole(pulumi.CustomResource):
|
|
1746
|
+
@overload
|
|
1747
|
+
def __init__(__self__,
|
|
1748
|
+
resource_name: str,
|
|
1749
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1750
|
+
allow_any_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1751
|
+
allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1752
|
+
allow_glob_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1753
|
+
allow_ip_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1754
|
+
allow_localhost: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1755
|
+
allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1756
|
+
allow_wildcard_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1757
|
+
allowed_domains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1758
|
+
allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1759
|
+
allowed_other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1760
|
+
allowed_serial_numbers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1761
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1762
|
+
allowed_uri_sans_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1763
|
+
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1764
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1765
|
+
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1766
|
+
client_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1767
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1768
|
+
code_signing_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1769
|
+
countries: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1770
|
+
email_protection_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1771
|
+
enforce_hostnames: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1772
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1773
|
+
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1774
|
+
generate_lease: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1775
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1776
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1777
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1778
|
+
key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1779
|
+
localities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1780
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1781
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1782
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1783
|
+
no_store: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1784
|
+
no_store_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1785
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1786
|
+
not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1787
|
+
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1788
|
+
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1789
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
|
1790
|
+
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1791
|
+
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1792
|
+
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1793
|
+
require_cn: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1794
|
+
serial_number_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1795
|
+
server_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1796
|
+
signature_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1797
|
+
street_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1798
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1799
|
+
use_csr_common_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1800
|
+
use_csr_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1801
|
+
use_pss: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1802
|
+
__props__=None):
|
|
1803
|
+
"""
|
|
1804
|
+
Creates a role on an PKI Secret Backend for Vault.
|
|
1805
|
+
|
|
1806
|
+
## Example Usage
|
|
1807
|
+
|
|
1808
|
+
```python
|
|
1809
|
+
import pulumi
|
|
1810
|
+
import pulumi_vault as vault
|
|
1811
|
+
|
|
1812
|
+
pki = vault.Mount("pki",
|
|
1813
|
+
path="pki",
|
|
1814
|
+
type="pki",
|
|
1815
|
+
default_lease_ttl_seconds=3600,
|
|
1816
|
+
max_lease_ttl_seconds=86400)
|
|
1817
|
+
role = vault.pkisecret.SecretBackendRole("role",
|
|
1818
|
+
backend=pki.path,
|
|
1819
|
+
name="my_role",
|
|
1820
|
+
ttl="3600",
|
|
1821
|
+
allow_ip_sans=True,
|
|
1822
|
+
key_type="rsa",
|
|
1823
|
+
key_bits=4096,
|
|
1824
|
+
allowed_domains=[
|
|
1825
|
+
"example.com",
|
|
1826
|
+
"my.domain",
|
|
1827
|
+
],
|
|
1828
|
+
allow_subdomains=True)
|
|
1829
|
+
```
|
|
1830
|
+
|
|
1831
|
+
## Import
|
|
1832
|
+
|
|
1833
|
+
PKI secret backend roles can be imported using the `path`, e.g.
|
|
1834
|
+
|
|
1835
|
+
```sh
|
|
1836
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
|
1837
|
+
```
|
|
1838
|
+
|
|
1839
|
+
:param str resource_name: The name of the resource.
|
|
1840
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1841
|
+
:param pulumi.Input[_builtins.bool] allow_any_name: Flag to allow any name
|
|
1842
|
+
:param pulumi.Input[_builtins.bool] allow_bare_domains: Flag to allow certificates matching the actual domain
|
|
1843
|
+
:param pulumi.Input[_builtins.bool] allow_glob_domains: Flag to allow names containing glob patterns.
|
|
1844
|
+
:param pulumi.Input[_builtins.bool] allow_ip_sans: Flag to allow IP SANs
|
|
1845
|
+
:param pulumi.Input[_builtins.bool] allow_localhost: Flag to allow certificates for localhost
|
|
1846
|
+
:param pulumi.Input[_builtins.bool] allow_subdomains: Flag to allow certificates matching subdomains
|
|
1847
|
+
:param pulumi.Input[_builtins.bool] allow_wildcard_certificates: Flag to allow wildcard certificates.
|
|
1848
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_domains: List of allowed domains for certificates
|
|
1849
|
+
:param pulumi.Input[_builtins.bool] allowed_domains_template: Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
1850
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_other_sans: Defines allowed custom SANs
|
|
1851
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_serial_numbers: An array of allowed serial numbers to put in Subject
|
|
1852
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Defines allowed URI SANs
|
|
1853
|
+
:param pulumi.Input[_builtins.bool] allowed_uri_sans_template: Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
1854
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_user_ids: Defines allowed User IDs
|
|
1855
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
1856
|
+
:param pulumi.Input[_builtins.bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
|
1857
|
+
:param pulumi.Input[_builtins.bool] client_flag: Flag to specify certificates for client use
|
|
1858
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
1859
|
+
:param pulumi.Input[_builtins.bool] code_signing_flag: Flag to specify certificates for code signing use
|
|
1860
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] countries: The country of generated certificates
|
|
1861
|
+
:param pulumi.Input[_builtins.bool] email_protection_flag: Flag to specify certificates for email protection use
|
|
1862
|
+
:param pulumi.Input[_builtins.bool] enforce_hostnames: Flag to allow only valid host names
|
|
1863
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
1864
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
|
1865
|
+
:param pulumi.Input[_builtins.bool] generate_lease: Flag to generate leases with certificates
|
|
1866
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. May
|
|
1867
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
1868
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
1869
|
+
overriding the role's `issuer_ref` value.
|
|
1870
|
+
:param pulumi.Input[_builtins.int] key_bits: The number of bits of generated keys
|
|
1871
|
+
:param pulumi.Input[_builtins.str] key_type: The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
1872
|
+
Defaults to `rsa`
|
|
1873
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] key_usages: Specify the allowed key usage constraint on issued
|
|
1874
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
1875
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
1876
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] localities: The locality of generated certificates
|
|
1877
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum lease TTL, in seconds, for the role.
|
|
1878
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend. Must be unique within the backend.
|
|
1879
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
1880
|
+
The value should not contain leading or trailing forward slashes.
|
|
1881
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1882
|
+
*Available only for Vault Enterprise*.
|
|
1883
|
+
:param pulumi.Input[_builtins.bool] no_store: Flag to not store certificates in the storage backend
|
|
1884
|
+
:param pulumi.Input[_builtins.bool] no_store_metadata: Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
1885
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
1886
|
+
:param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
|
1887
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organization_unit: The organization unit of generated certificates
|
|
1888
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organizations: The organization of generated certificates
|
|
1889
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
1890
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
1891
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] postal_codes: The postal code of generated certificates
|
|
1892
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] provinces: The province of generated certificates
|
|
1893
|
+
:param pulumi.Input[_builtins.bool] require_cn: Flag to force CN usage
|
|
1894
|
+
:param pulumi.Input[_builtins.str] serial_number_source: Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
1895
|
+
|
|
1896
|
+
Example usage:
|
|
1897
|
+
:param pulumi.Input[_builtins.bool] server_flag: Flag to specify certificates for server use
|
|
1898
|
+
:param pulumi.Input[_builtins.int] signature_bits: The number of bits to use in the signature algorithm
|
|
1899
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] street_addresses: The street address of generated certificates
|
|
1900
|
+
:param pulumi.Input[_builtins.str] ttl: The TTL, in seconds, for any certificate issued against this role.
|
|
1901
|
+
:param pulumi.Input[_builtins.bool] use_csr_common_name: Flag to use the CN in the CSR
|
|
1902
|
+
:param pulumi.Input[_builtins.bool] use_csr_sans: Flag to use the SANs in the CSR
|
|
1903
|
+
:param pulumi.Input[_builtins.bool] use_pss: Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
1904
|
+
"""
|
|
1905
|
+
...
|
|
1906
|
+
@overload
|
|
1907
|
+
def __init__(__self__,
|
|
1908
|
+
resource_name: str,
|
|
1909
|
+
args: SecretBackendRoleArgs,
|
|
1910
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
1911
|
+
"""
|
|
1912
|
+
Creates a role on an PKI Secret Backend for Vault.
|
|
1913
|
+
|
|
1914
|
+
## Example Usage
|
|
1915
|
+
|
|
1916
|
+
```python
|
|
1917
|
+
import pulumi
|
|
1918
|
+
import pulumi_vault as vault
|
|
1919
|
+
|
|
1920
|
+
pki = vault.Mount("pki",
|
|
1921
|
+
path="pki",
|
|
1922
|
+
type="pki",
|
|
1923
|
+
default_lease_ttl_seconds=3600,
|
|
1924
|
+
max_lease_ttl_seconds=86400)
|
|
1925
|
+
role = vault.pkisecret.SecretBackendRole("role",
|
|
1926
|
+
backend=pki.path,
|
|
1927
|
+
name="my_role",
|
|
1928
|
+
ttl="3600",
|
|
1929
|
+
allow_ip_sans=True,
|
|
1930
|
+
key_type="rsa",
|
|
1931
|
+
key_bits=4096,
|
|
1932
|
+
allowed_domains=[
|
|
1933
|
+
"example.com",
|
|
1934
|
+
"my.domain",
|
|
1935
|
+
],
|
|
1936
|
+
allow_subdomains=True)
|
|
1937
|
+
```
|
|
1938
|
+
|
|
1939
|
+
## Import
|
|
1940
|
+
|
|
1941
|
+
PKI secret backend roles can be imported using the `path`, e.g.
|
|
1942
|
+
|
|
1943
|
+
```sh
|
|
1944
|
+
$ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
|
|
1945
|
+
```
|
|
1946
|
+
|
|
1947
|
+
:param str resource_name: The name of the resource.
|
|
1948
|
+
:param SecretBackendRoleArgs args: The arguments to use to populate this resource's properties.
|
|
1949
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1950
|
+
"""
|
|
1951
|
+
...
|
|
1952
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
1953
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
1954
|
+
if resource_args is not None:
|
|
1955
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
1956
|
+
else:
|
|
1957
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
1958
|
+
|
|
1959
|
+
def _internal_init(__self__,
|
|
1960
|
+
resource_name: str,
|
|
1961
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1962
|
+
allow_any_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1963
|
+
allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1964
|
+
allow_glob_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1965
|
+
allow_ip_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1966
|
+
allow_localhost: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1967
|
+
allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1968
|
+
allow_wildcard_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1969
|
+
allowed_domains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1970
|
+
allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1971
|
+
allowed_other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1972
|
+
allowed_serial_numbers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1973
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1974
|
+
allowed_uri_sans_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1975
|
+
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1976
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1977
|
+
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1978
|
+
client_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1979
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1980
|
+
code_signing_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1981
|
+
countries: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1982
|
+
email_protection_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1983
|
+
enforce_hostnames: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1984
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1985
|
+
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1986
|
+
generate_lease: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1987
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1988
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
1989
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1990
|
+
key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1991
|
+
localities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
1992
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1993
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1994
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1995
|
+
no_store: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1996
|
+
no_store_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1997
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1998
|
+
not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1999
|
+
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2000
|
+
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2001
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
|
2002
|
+
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2003
|
+
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2004
|
+
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2005
|
+
require_cn: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2006
|
+
serial_number_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2007
|
+
server_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2008
|
+
signature_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
2009
|
+
street_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2010
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2011
|
+
use_csr_common_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2012
|
+
use_csr_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2013
|
+
use_pss: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2014
|
+
__props__=None):
|
|
2015
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
2016
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
2017
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
2018
|
+
if opts.id is None:
|
|
2019
|
+
if __props__ is not None:
|
|
2020
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
2021
|
+
__props__ = SecretBackendRoleArgs.__new__(SecretBackendRoleArgs)
|
|
2022
|
+
|
|
2023
|
+
__props__.__dict__["allow_any_name"] = allow_any_name
|
|
2024
|
+
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
|
2025
|
+
__props__.__dict__["allow_glob_domains"] = allow_glob_domains
|
|
2026
|
+
__props__.__dict__["allow_ip_sans"] = allow_ip_sans
|
|
2027
|
+
__props__.__dict__["allow_localhost"] = allow_localhost
|
|
2028
|
+
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
|
2029
|
+
__props__.__dict__["allow_wildcard_certificates"] = allow_wildcard_certificates
|
|
2030
|
+
__props__.__dict__["allowed_domains"] = allowed_domains
|
|
2031
|
+
__props__.__dict__["allowed_domains_template"] = allowed_domains_template
|
|
2032
|
+
__props__.__dict__["allowed_other_sans"] = allowed_other_sans
|
|
2033
|
+
__props__.__dict__["allowed_serial_numbers"] = allowed_serial_numbers
|
|
2034
|
+
__props__.__dict__["allowed_uri_sans"] = allowed_uri_sans
|
|
2035
|
+
__props__.__dict__["allowed_uri_sans_template"] = allowed_uri_sans_template
|
|
2036
|
+
__props__.__dict__["allowed_user_ids"] = allowed_user_ids
|
|
2037
|
+
if backend is None and not opts.urn:
|
|
2038
|
+
raise TypeError("Missing required property 'backend'")
|
|
2039
|
+
__props__.__dict__["backend"] = backend
|
|
2040
|
+
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
|
2041
|
+
__props__.__dict__["client_flag"] = client_flag
|
|
2042
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
|
2043
|
+
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
|
2044
|
+
__props__.__dict__["countries"] = countries
|
|
2045
|
+
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
|
2046
|
+
__props__.__dict__["enforce_hostnames"] = enforce_hostnames
|
|
2047
|
+
__props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
|
|
2048
|
+
__props__.__dict__["ext_key_usages"] = ext_key_usages
|
|
2049
|
+
__props__.__dict__["generate_lease"] = generate_lease
|
|
2050
|
+
__props__.__dict__["issuer_ref"] = issuer_ref
|
|
2051
|
+
__props__.__dict__["key_bits"] = key_bits
|
|
2052
|
+
__props__.__dict__["key_type"] = key_type
|
|
2053
|
+
__props__.__dict__["key_usages"] = key_usages
|
|
2054
|
+
__props__.__dict__["localities"] = localities
|
|
2055
|
+
__props__.__dict__["max_ttl"] = max_ttl
|
|
2056
|
+
__props__.__dict__["name"] = name
|
|
2057
|
+
__props__.__dict__["namespace"] = namespace
|
|
2058
|
+
__props__.__dict__["no_store"] = no_store
|
|
2059
|
+
__props__.__dict__["no_store_metadata"] = no_store_metadata
|
|
2060
|
+
__props__.__dict__["not_after"] = not_after
|
|
2061
|
+
__props__.__dict__["not_before_duration"] = not_before_duration
|
|
2062
|
+
__props__.__dict__["organization_unit"] = organization_unit
|
|
2063
|
+
__props__.__dict__["organizations"] = organizations
|
|
2064
|
+
__props__.__dict__["policy_identifier"] = policy_identifier
|
|
2065
|
+
__props__.__dict__["policy_identifiers"] = policy_identifiers
|
|
2066
|
+
__props__.__dict__["postal_codes"] = postal_codes
|
|
2067
|
+
__props__.__dict__["provinces"] = provinces
|
|
2068
|
+
__props__.__dict__["require_cn"] = require_cn
|
|
2069
|
+
__props__.__dict__["serial_number_source"] = serial_number_source
|
|
2070
|
+
__props__.__dict__["server_flag"] = server_flag
|
|
2071
|
+
__props__.__dict__["signature_bits"] = signature_bits
|
|
2072
|
+
__props__.__dict__["street_addresses"] = street_addresses
|
|
2073
|
+
__props__.__dict__["ttl"] = ttl
|
|
2074
|
+
__props__.__dict__["use_csr_common_name"] = use_csr_common_name
|
|
2075
|
+
__props__.__dict__["use_csr_sans"] = use_csr_sans
|
|
2076
|
+
__props__.__dict__["use_pss"] = use_pss
|
|
2077
|
+
super(SecretBackendRole, __self__).__init__(
|
|
2078
|
+
'vault:pkiSecret/secretBackendRole:SecretBackendRole',
|
|
2079
|
+
resource_name,
|
|
2080
|
+
__props__,
|
|
2081
|
+
opts)
|
|
2082
|
+
|
|
2083
|
+
@staticmethod
|
|
2084
|
+
def get(resource_name: str,
|
|
2085
|
+
id: pulumi.Input[str],
|
|
2086
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
2087
|
+
allow_any_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2088
|
+
allow_bare_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2089
|
+
allow_glob_domains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2090
|
+
allow_ip_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2091
|
+
allow_localhost: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2092
|
+
allow_subdomains: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2093
|
+
allow_wildcard_certificates: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2094
|
+
allowed_domains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2095
|
+
allowed_domains_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2096
|
+
allowed_other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2097
|
+
allowed_serial_numbers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2098
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2099
|
+
allowed_uri_sans_template: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2100
|
+
allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2101
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2102
|
+
basic_constraints_valid_for_non_ca: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2103
|
+
client_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2104
|
+
cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2105
|
+
code_signing_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2106
|
+
countries: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2107
|
+
email_protection_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2108
|
+
enforce_hostnames: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2109
|
+
ext_key_usage_oids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2110
|
+
ext_key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2111
|
+
generate_lease: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2112
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2113
|
+
key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
2114
|
+
key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2115
|
+
key_usages: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2116
|
+
localities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2117
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2118
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2119
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2120
|
+
no_store: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2121
|
+
no_store_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2122
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2123
|
+
not_before_duration: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2124
|
+
organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2125
|
+
organizations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2126
|
+
policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
|
|
2127
|
+
policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2128
|
+
postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2129
|
+
provinces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2130
|
+
require_cn: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2131
|
+
serial_number_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2132
|
+
server_flag: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2133
|
+
signature_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
2134
|
+
street_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
2135
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2136
|
+
use_csr_common_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2137
|
+
use_csr_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2138
|
+
use_pss: Optional[pulumi.Input[_builtins.bool]] = None) -> 'SecretBackendRole':
|
|
2139
|
+
"""
|
|
2140
|
+
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
|
2141
|
+
properties used to qualify the lookup.
|
|
2142
|
+
|
|
2143
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
2144
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
2145
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
2146
|
+
:param pulumi.Input[_builtins.bool] allow_any_name: Flag to allow any name
|
|
2147
|
+
:param pulumi.Input[_builtins.bool] allow_bare_domains: Flag to allow certificates matching the actual domain
|
|
2148
|
+
:param pulumi.Input[_builtins.bool] allow_glob_domains: Flag to allow names containing glob patterns.
|
|
2149
|
+
:param pulumi.Input[_builtins.bool] allow_ip_sans: Flag to allow IP SANs
|
|
2150
|
+
:param pulumi.Input[_builtins.bool] allow_localhost: Flag to allow certificates for localhost
|
|
2151
|
+
:param pulumi.Input[_builtins.bool] allow_subdomains: Flag to allow certificates matching subdomains
|
|
2152
|
+
:param pulumi.Input[_builtins.bool] allow_wildcard_certificates: Flag to allow wildcard certificates.
|
|
2153
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_domains: List of allowed domains for certificates
|
|
2154
|
+
:param pulumi.Input[_builtins.bool] allowed_domains_template: Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
2155
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_other_sans: Defines allowed custom SANs
|
|
2156
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_serial_numbers: An array of allowed serial numbers to put in Subject
|
|
2157
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Defines allowed URI SANs
|
|
2158
|
+
:param pulumi.Input[_builtins.bool] allowed_uri_sans_template: Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
2159
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_user_ids: Defines allowed User IDs
|
|
2160
|
+
:param pulumi.Input[_builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
2161
|
+
:param pulumi.Input[_builtins.bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
|
|
2162
|
+
:param pulumi.Input[_builtins.bool] client_flag: Flag to specify certificates for client use
|
|
2163
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
2164
|
+
:param pulumi.Input[_builtins.bool] code_signing_flag: Flag to specify certificates for code signing use
|
|
2165
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] countries: The country of generated certificates
|
|
2166
|
+
:param pulumi.Input[_builtins.bool] email_protection_flag: Flag to specify certificates for email protection use
|
|
2167
|
+
:param pulumi.Input[_builtins.bool] enforce_hostnames: Flag to allow only valid host names
|
|
2168
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usage_oids: Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
2169
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ext_key_usages: Specify the allowed extended key usage constraint on issued certificates
|
|
2170
|
+
:param pulumi.Input[_builtins.bool] generate_lease: Flag to generate leases with certificates
|
|
2171
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. May
|
|
2172
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
2173
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
2174
|
+
overriding the role's `issuer_ref` value.
|
|
2175
|
+
:param pulumi.Input[_builtins.int] key_bits: The number of bits of generated keys
|
|
2176
|
+
:param pulumi.Input[_builtins.str] key_type: The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
2177
|
+
Defaults to `rsa`
|
|
2178
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] key_usages: Specify the allowed key usage constraint on issued
|
|
2179
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
2180
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
2181
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] localities: The locality of generated certificates
|
|
2182
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum lease TTL, in seconds, for the role.
|
|
2183
|
+
:param pulumi.Input[_builtins.str] name: The name to identify this role within the backend. Must be unique within the backend.
|
|
2184
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
2185
|
+
The value should not contain leading or trailing forward slashes.
|
|
2186
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
2187
|
+
*Available only for Vault Enterprise*.
|
|
2188
|
+
:param pulumi.Input[_builtins.bool] no_store: Flag to not store certificates in the storage backend
|
|
2189
|
+
:param pulumi.Input[_builtins.bool] no_store_metadata: Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
2190
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
2191
|
+
:param pulumi.Input[_builtins.str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
|
|
2192
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organization_unit: The organization unit of generated certificates
|
|
2193
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] organizations: The organization of generated certificates
|
|
2194
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
2195
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
2196
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] postal_codes: The postal code of generated certificates
|
|
2197
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] provinces: The province of generated certificates
|
|
2198
|
+
:param pulumi.Input[_builtins.bool] require_cn: Flag to force CN usage
|
|
2199
|
+
:param pulumi.Input[_builtins.str] serial_number_source: Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
2200
|
+
|
|
2201
|
+
Example usage:
|
|
2202
|
+
:param pulumi.Input[_builtins.bool] server_flag: Flag to specify certificates for server use
|
|
2203
|
+
:param pulumi.Input[_builtins.int] signature_bits: The number of bits to use in the signature algorithm
|
|
2204
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] street_addresses: The street address of generated certificates
|
|
2205
|
+
:param pulumi.Input[_builtins.str] ttl: The TTL, in seconds, for any certificate issued against this role.
|
|
2206
|
+
:param pulumi.Input[_builtins.bool] use_csr_common_name: Flag to use the CN in the CSR
|
|
2207
|
+
:param pulumi.Input[_builtins.bool] use_csr_sans: Flag to use the SANs in the CSR
|
|
2208
|
+
:param pulumi.Input[_builtins.bool] use_pss: Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
2209
|
+
"""
|
|
2210
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
2211
|
+
|
|
2212
|
+
__props__ = _SecretBackendRoleState.__new__(_SecretBackendRoleState)
|
|
2213
|
+
|
|
2214
|
+
__props__.__dict__["allow_any_name"] = allow_any_name
|
|
2215
|
+
__props__.__dict__["allow_bare_domains"] = allow_bare_domains
|
|
2216
|
+
__props__.__dict__["allow_glob_domains"] = allow_glob_domains
|
|
2217
|
+
__props__.__dict__["allow_ip_sans"] = allow_ip_sans
|
|
2218
|
+
__props__.__dict__["allow_localhost"] = allow_localhost
|
|
2219
|
+
__props__.__dict__["allow_subdomains"] = allow_subdomains
|
|
2220
|
+
__props__.__dict__["allow_wildcard_certificates"] = allow_wildcard_certificates
|
|
2221
|
+
__props__.__dict__["allowed_domains"] = allowed_domains
|
|
2222
|
+
__props__.__dict__["allowed_domains_template"] = allowed_domains_template
|
|
2223
|
+
__props__.__dict__["allowed_other_sans"] = allowed_other_sans
|
|
2224
|
+
__props__.__dict__["allowed_serial_numbers"] = allowed_serial_numbers
|
|
2225
|
+
__props__.__dict__["allowed_uri_sans"] = allowed_uri_sans
|
|
2226
|
+
__props__.__dict__["allowed_uri_sans_template"] = allowed_uri_sans_template
|
|
2227
|
+
__props__.__dict__["allowed_user_ids"] = allowed_user_ids
|
|
2228
|
+
__props__.__dict__["backend"] = backend
|
|
2229
|
+
__props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
|
|
2230
|
+
__props__.__dict__["client_flag"] = client_flag
|
|
2231
|
+
__props__.__dict__["cn_validations"] = cn_validations
|
|
2232
|
+
__props__.__dict__["code_signing_flag"] = code_signing_flag
|
|
2233
|
+
__props__.__dict__["countries"] = countries
|
|
2234
|
+
__props__.__dict__["email_protection_flag"] = email_protection_flag
|
|
2235
|
+
__props__.__dict__["enforce_hostnames"] = enforce_hostnames
|
|
2236
|
+
__props__.__dict__["ext_key_usage_oids"] = ext_key_usage_oids
|
|
2237
|
+
__props__.__dict__["ext_key_usages"] = ext_key_usages
|
|
2238
|
+
__props__.__dict__["generate_lease"] = generate_lease
|
|
2239
|
+
__props__.__dict__["issuer_ref"] = issuer_ref
|
|
2240
|
+
__props__.__dict__["key_bits"] = key_bits
|
|
2241
|
+
__props__.__dict__["key_type"] = key_type
|
|
2242
|
+
__props__.__dict__["key_usages"] = key_usages
|
|
2243
|
+
__props__.__dict__["localities"] = localities
|
|
2244
|
+
__props__.__dict__["max_ttl"] = max_ttl
|
|
2245
|
+
__props__.__dict__["name"] = name
|
|
2246
|
+
__props__.__dict__["namespace"] = namespace
|
|
2247
|
+
__props__.__dict__["no_store"] = no_store
|
|
2248
|
+
__props__.__dict__["no_store_metadata"] = no_store_metadata
|
|
2249
|
+
__props__.__dict__["not_after"] = not_after
|
|
2250
|
+
__props__.__dict__["not_before_duration"] = not_before_duration
|
|
2251
|
+
__props__.__dict__["organization_unit"] = organization_unit
|
|
2252
|
+
__props__.__dict__["organizations"] = organizations
|
|
2253
|
+
__props__.__dict__["policy_identifier"] = policy_identifier
|
|
2254
|
+
__props__.__dict__["policy_identifiers"] = policy_identifiers
|
|
2255
|
+
__props__.__dict__["postal_codes"] = postal_codes
|
|
2256
|
+
__props__.__dict__["provinces"] = provinces
|
|
2257
|
+
__props__.__dict__["require_cn"] = require_cn
|
|
2258
|
+
__props__.__dict__["serial_number_source"] = serial_number_source
|
|
2259
|
+
__props__.__dict__["server_flag"] = server_flag
|
|
2260
|
+
__props__.__dict__["signature_bits"] = signature_bits
|
|
2261
|
+
__props__.__dict__["street_addresses"] = street_addresses
|
|
2262
|
+
__props__.__dict__["ttl"] = ttl
|
|
2263
|
+
__props__.__dict__["use_csr_common_name"] = use_csr_common_name
|
|
2264
|
+
__props__.__dict__["use_csr_sans"] = use_csr_sans
|
|
2265
|
+
__props__.__dict__["use_pss"] = use_pss
|
|
2266
|
+
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
|
2267
|
+
|
|
2268
|
+
@_builtins.property
|
|
2269
|
+
@pulumi.getter(name="allowAnyName")
|
|
2270
|
+
def allow_any_name(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2271
|
+
"""
|
|
2272
|
+
Flag to allow any name
|
|
2273
|
+
"""
|
|
2274
|
+
return pulumi.get(self, "allow_any_name")
|
|
2275
|
+
|
|
2276
|
+
@_builtins.property
|
|
2277
|
+
@pulumi.getter(name="allowBareDomains")
|
|
2278
|
+
def allow_bare_domains(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2279
|
+
"""
|
|
2280
|
+
Flag to allow certificates matching the actual domain
|
|
2281
|
+
"""
|
|
2282
|
+
return pulumi.get(self, "allow_bare_domains")
|
|
2283
|
+
|
|
2284
|
+
@_builtins.property
|
|
2285
|
+
@pulumi.getter(name="allowGlobDomains")
|
|
2286
|
+
def allow_glob_domains(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2287
|
+
"""
|
|
2288
|
+
Flag to allow names containing glob patterns.
|
|
2289
|
+
"""
|
|
2290
|
+
return pulumi.get(self, "allow_glob_domains")
|
|
2291
|
+
|
|
2292
|
+
@_builtins.property
|
|
2293
|
+
@pulumi.getter(name="allowIpSans")
|
|
2294
|
+
def allow_ip_sans(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2295
|
+
"""
|
|
2296
|
+
Flag to allow IP SANs
|
|
2297
|
+
"""
|
|
2298
|
+
return pulumi.get(self, "allow_ip_sans")
|
|
2299
|
+
|
|
2300
|
+
@_builtins.property
|
|
2301
|
+
@pulumi.getter(name="allowLocalhost")
|
|
2302
|
+
def allow_localhost(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2303
|
+
"""
|
|
2304
|
+
Flag to allow certificates for localhost
|
|
2305
|
+
"""
|
|
2306
|
+
return pulumi.get(self, "allow_localhost")
|
|
2307
|
+
|
|
2308
|
+
@_builtins.property
|
|
2309
|
+
@pulumi.getter(name="allowSubdomains")
|
|
2310
|
+
def allow_subdomains(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2311
|
+
"""
|
|
2312
|
+
Flag to allow certificates matching subdomains
|
|
2313
|
+
"""
|
|
2314
|
+
return pulumi.get(self, "allow_subdomains")
|
|
2315
|
+
|
|
2316
|
+
@_builtins.property
|
|
2317
|
+
@pulumi.getter(name="allowWildcardCertificates")
|
|
2318
|
+
def allow_wildcard_certificates(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2319
|
+
"""
|
|
2320
|
+
Flag to allow wildcard certificates.
|
|
2321
|
+
"""
|
|
2322
|
+
return pulumi.get(self, "allow_wildcard_certificates")
|
|
2323
|
+
|
|
2324
|
+
@_builtins.property
|
|
2325
|
+
@pulumi.getter(name="allowedDomains")
|
|
2326
|
+
def allowed_domains(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2327
|
+
"""
|
|
2328
|
+
List of allowed domains for certificates
|
|
2329
|
+
"""
|
|
2330
|
+
return pulumi.get(self, "allowed_domains")
|
|
2331
|
+
|
|
2332
|
+
@_builtins.property
|
|
2333
|
+
@pulumi.getter(name="allowedDomainsTemplate")
|
|
2334
|
+
def allowed_domains_template(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2335
|
+
"""
|
|
2336
|
+
Flag, if set, `allowed_domains` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
2337
|
+
"""
|
|
2338
|
+
return pulumi.get(self, "allowed_domains_template")
|
|
2339
|
+
|
|
2340
|
+
@_builtins.property
|
|
2341
|
+
@pulumi.getter(name="allowedOtherSans")
|
|
2342
|
+
def allowed_other_sans(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2343
|
+
"""
|
|
2344
|
+
Defines allowed custom SANs
|
|
2345
|
+
"""
|
|
2346
|
+
return pulumi.get(self, "allowed_other_sans")
|
|
2347
|
+
|
|
2348
|
+
@_builtins.property
|
|
2349
|
+
@pulumi.getter(name="allowedSerialNumbers")
|
|
2350
|
+
def allowed_serial_numbers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2351
|
+
"""
|
|
2352
|
+
An array of allowed serial numbers to put in Subject
|
|
2353
|
+
"""
|
|
2354
|
+
return pulumi.get(self, "allowed_serial_numbers")
|
|
2355
|
+
|
|
2356
|
+
@_builtins.property
|
|
2357
|
+
@pulumi.getter(name="allowedUriSans")
|
|
2358
|
+
def allowed_uri_sans(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2359
|
+
"""
|
|
2360
|
+
Defines allowed URI SANs
|
|
2361
|
+
"""
|
|
2362
|
+
return pulumi.get(self, "allowed_uri_sans")
|
|
2363
|
+
|
|
2364
|
+
@_builtins.property
|
|
2365
|
+
@pulumi.getter(name="allowedUriSansTemplate")
|
|
2366
|
+
def allowed_uri_sans_template(self) -> pulumi.Output[_builtins.bool]:
|
|
2367
|
+
"""
|
|
2368
|
+
Flag, if set, `allowed_uri_sans` can be specified using identity template expressions such as `{{identity.entity.aliases.<mount accessor>.name}}`.
|
|
2369
|
+
"""
|
|
2370
|
+
return pulumi.get(self, "allowed_uri_sans_template")
|
|
2371
|
+
|
|
2372
|
+
@_builtins.property
|
|
2373
|
+
@pulumi.getter(name="allowedUserIds")
|
|
2374
|
+
def allowed_user_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2375
|
+
"""
|
|
2376
|
+
Defines allowed User IDs
|
|
2377
|
+
"""
|
|
2378
|
+
return pulumi.get(self, "allowed_user_ids")
|
|
2379
|
+
|
|
2380
|
+
@_builtins.property
|
|
2381
|
+
@pulumi.getter
|
|
2382
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
|
2383
|
+
"""
|
|
2384
|
+
The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
|
|
2385
|
+
"""
|
|
2386
|
+
return pulumi.get(self, "backend")
|
|
2387
|
+
|
|
2388
|
+
@_builtins.property
|
|
2389
|
+
@pulumi.getter(name="basicConstraintsValidForNonCa")
|
|
2390
|
+
def basic_constraints_valid_for_non_ca(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2391
|
+
"""
|
|
2392
|
+
Flag to mark basic constraints valid when issuing non-CA certificates
|
|
2393
|
+
"""
|
|
2394
|
+
return pulumi.get(self, "basic_constraints_valid_for_non_ca")
|
|
2395
|
+
|
|
2396
|
+
@_builtins.property
|
|
2397
|
+
@pulumi.getter(name="clientFlag")
|
|
2398
|
+
def client_flag(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2399
|
+
"""
|
|
2400
|
+
Flag to specify certificates for client use
|
|
2401
|
+
"""
|
|
2402
|
+
return pulumi.get(self, "client_flag")
|
|
2403
|
+
|
|
2404
|
+
@_builtins.property
|
|
2405
|
+
@pulumi.getter(name="cnValidations")
|
|
2406
|
+
def cn_validations(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
2407
|
+
"""
|
|
2408
|
+
Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
|
|
2409
|
+
"""
|
|
2410
|
+
return pulumi.get(self, "cn_validations")
|
|
2411
|
+
|
|
2412
|
+
@_builtins.property
|
|
2413
|
+
@pulumi.getter(name="codeSigningFlag")
|
|
2414
|
+
def code_signing_flag(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2415
|
+
"""
|
|
2416
|
+
Flag to specify certificates for code signing use
|
|
2417
|
+
"""
|
|
2418
|
+
return pulumi.get(self, "code_signing_flag")
|
|
2419
|
+
|
|
2420
|
+
@_builtins.property
|
|
2421
|
+
@pulumi.getter
|
|
2422
|
+
def countries(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2423
|
+
"""
|
|
2424
|
+
The country of generated certificates
|
|
2425
|
+
"""
|
|
2426
|
+
return pulumi.get(self, "countries")
|
|
2427
|
+
|
|
2428
|
+
@_builtins.property
|
|
2429
|
+
@pulumi.getter(name="emailProtectionFlag")
|
|
2430
|
+
def email_protection_flag(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2431
|
+
"""
|
|
2432
|
+
Flag to specify certificates for email protection use
|
|
2433
|
+
"""
|
|
2434
|
+
return pulumi.get(self, "email_protection_flag")
|
|
2435
|
+
|
|
2436
|
+
@_builtins.property
|
|
2437
|
+
@pulumi.getter(name="enforceHostnames")
|
|
2438
|
+
def enforce_hostnames(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2439
|
+
"""
|
|
2440
|
+
Flag to allow only valid host names
|
|
2441
|
+
"""
|
|
2442
|
+
return pulumi.get(self, "enforce_hostnames")
|
|
2443
|
+
|
|
2444
|
+
@_builtins.property
|
|
2445
|
+
@pulumi.getter(name="extKeyUsageOids")
|
|
2446
|
+
def ext_key_usage_oids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2447
|
+
"""
|
|
2448
|
+
Specify the allowed extended key usage OIDs constraint on issued certificates
|
|
2449
|
+
"""
|
|
2450
|
+
return pulumi.get(self, "ext_key_usage_oids")
|
|
2451
|
+
|
|
2452
|
+
@_builtins.property
|
|
2453
|
+
@pulumi.getter(name="extKeyUsages")
|
|
2454
|
+
def ext_key_usages(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2455
|
+
"""
|
|
2456
|
+
Specify the allowed extended key usage constraint on issued certificates
|
|
2457
|
+
"""
|
|
2458
|
+
return pulumi.get(self, "ext_key_usages")
|
|
2459
|
+
|
|
2460
|
+
@_builtins.property
|
|
2461
|
+
@pulumi.getter(name="generateLease")
|
|
2462
|
+
def generate_lease(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2463
|
+
"""
|
|
2464
|
+
Flag to generate leases with certificates
|
|
2465
|
+
"""
|
|
2466
|
+
return pulumi.get(self, "generate_lease")
|
|
2467
|
+
|
|
2468
|
+
@_builtins.property
|
|
2469
|
+
@pulumi.getter(name="issuerRef")
|
|
2470
|
+
def issuer_ref(self) -> pulumi.Output[_builtins.str]:
|
|
2471
|
+
"""
|
|
2472
|
+
Specifies the default issuer of this request. May
|
|
2473
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
2474
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
2475
|
+
overriding the role's `issuer_ref` value.
|
|
2476
|
+
"""
|
|
2477
|
+
return pulumi.get(self, "issuer_ref")
|
|
2478
|
+
|
|
2479
|
+
@_builtins.property
|
|
2480
|
+
@pulumi.getter(name="keyBits")
|
|
2481
|
+
def key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
2482
|
+
"""
|
|
2483
|
+
The number of bits of generated keys
|
|
2484
|
+
"""
|
|
2485
|
+
return pulumi.get(self, "key_bits")
|
|
2486
|
+
|
|
2487
|
+
@_builtins.property
|
|
2488
|
+
@pulumi.getter(name="keyType")
|
|
2489
|
+
def key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
2490
|
+
"""
|
|
2491
|
+
The generated key type, choices: `rsa`, `ec`, `ed25519`, `any`
|
|
2492
|
+
Defaults to `rsa`
|
|
2493
|
+
"""
|
|
2494
|
+
return pulumi.get(self, "key_type")
|
|
2495
|
+
|
|
2496
|
+
@_builtins.property
|
|
2497
|
+
@pulumi.getter(name="keyUsages")
|
|
2498
|
+
def key_usages(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
2499
|
+
"""
|
|
2500
|
+
Specify the allowed key usage constraint on issued
|
|
2501
|
+
certificates. Defaults to `["DigitalSignature", "KeyAgreement", "KeyEncipherment"])`.
|
|
2502
|
+
To specify no default key usage constraints, set this to an empty list `[]`.
|
|
2503
|
+
"""
|
|
2504
|
+
return pulumi.get(self, "key_usages")
|
|
2505
|
+
|
|
2506
|
+
@_builtins.property
|
|
2507
|
+
@pulumi.getter
|
|
2508
|
+
def localities(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2509
|
+
"""
|
|
2510
|
+
The locality of generated certificates
|
|
2511
|
+
"""
|
|
2512
|
+
return pulumi.get(self, "localities")
|
|
2513
|
+
|
|
2514
|
+
@_builtins.property
|
|
2515
|
+
@pulumi.getter(name="maxTtl")
|
|
2516
|
+
def max_ttl(self) -> pulumi.Output[_builtins.str]:
|
|
2517
|
+
"""
|
|
2518
|
+
The maximum lease TTL, in seconds, for the role.
|
|
2519
|
+
"""
|
|
2520
|
+
return pulumi.get(self, "max_ttl")
|
|
2521
|
+
|
|
2522
|
+
@_builtins.property
|
|
2523
|
+
@pulumi.getter
|
|
2524
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
2525
|
+
"""
|
|
2526
|
+
The name to identify this role within the backend. Must be unique within the backend.
|
|
2527
|
+
"""
|
|
2528
|
+
return pulumi.get(self, "name")
|
|
2529
|
+
|
|
2530
|
+
@_builtins.property
|
|
2531
|
+
@pulumi.getter
|
|
2532
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
2533
|
+
"""
|
|
2534
|
+
The namespace to provision the resource in.
|
|
2535
|
+
The value should not contain leading or trailing forward slashes.
|
|
2536
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
2537
|
+
*Available only for Vault Enterprise*.
|
|
2538
|
+
"""
|
|
2539
|
+
return pulumi.get(self, "namespace")
|
|
2540
|
+
|
|
2541
|
+
@_builtins.property
|
|
2542
|
+
@pulumi.getter(name="noStore")
|
|
2543
|
+
def no_store(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2544
|
+
"""
|
|
2545
|
+
Flag to not store certificates in the storage backend
|
|
2546
|
+
"""
|
|
2547
|
+
return pulumi.get(self, "no_store")
|
|
2548
|
+
|
|
2549
|
+
@_builtins.property
|
|
2550
|
+
@pulumi.getter(name="noStoreMetadata")
|
|
2551
|
+
def no_store_metadata(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2552
|
+
"""
|
|
2553
|
+
Allows metadata to be stored keyed on the certificate's serial number. The field is independent of no_store, allowing metadata storage regardless of whether certificates are stored. If true, metadata is not stored and an error is returned if the metadata field is specified on issuance APIs
|
|
2554
|
+
"""
|
|
2555
|
+
return pulumi.get(self, "no_store_metadata")
|
|
2556
|
+
|
|
2557
|
+
@_builtins.property
|
|
2558
|
+
@pulumi.getter(name="notAfter")
|
|
2559
|
+
def not_after(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
2560
|
+
"""
|
|
2561
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
2562
|
+
"""
|
|
2563
|
+
return pulumi.get(self, "not_after")
|
|
2564
|
+
|
|
2565
|
+
@_builtins.property
|
|
2566
|
+
@pulumi.getter(name="notBeforeDuration")
|
|
2567
|
+
def not_before_duration(self) -> pulumi.Output[_builtins.str]:
|
|
2568
|
+
"""
|
|
2569
|
+
Specifies the duration by which to backdate the NotBefore property.
|
|
2570
|
+
"""
|
|
2571
|
+
return pulumi.get(self, "not_before_duration")
|
|
2572
|
+
|
|
2573
|
+
@_builtins.property
|
|
2574
|
+
@pulumi.getter(name="organizationUnit")
|
|
2575
|
+
def organization_unit(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2576
|
+
"""
|
|
2577
|
+
The organization unit of generated certificates
|
|
2578
|
+
"""
|
|
2579
|
+
return pulumi.get(self, "organization_unit")
|
|
2580
|
+
|
|
2581
|
+
@_builtins.property
|
|
2582
|
+
@pulumi.getter
|
|
2583
|
+
def organizations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2584
|
+
"""
|
|
2585
|
+
The organization of generated certificates
|
|
2586
|
+
"""
|
|
2587
|
+
return pulumi.get(self, "organizations")
|
|
2588
|
+
|
|
2589
|
+
@_builtins.property
|
|
2590
|
+
@pulumi.getter(name="policyIdentifier")
|
|
2591
|
+
def policy_identifier(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRolePolicyIdentifier']]]:
|
|
2592
|
+
"""
|
|
2593
|
+
(Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
|
|
2594
|
+
"""
|
|
2595
|
+
return pulumi.get(self, "policy_identifier")
|
|
2596
|
+
|
|
2597
|
+
@_builtins.property
|
|
2598
|
+
@pulumi.getter(name="policyIdentifiers")
|
|
2599
|
+
def policy_identifiers(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2600
|
+
"""
|
|
2601
|
+
Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
|
|
2602
|
+
"""
|
|
2603
|
+
return pulumi.get(self, "policy_identifiers")
|
|
2604
|
+
|
|
2605
|
+
@_builtins.property
|
|
2606
|
+
@pulumi.getter(name="postalCodes")
|
|
2607
|
+
def postal_codes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2608
|
+
"""
|
|
2609
|
+
The postal code of generated certificates
|
|
2610
|
+
"""
|
|
2611
|
+
return pulumi.get(self, "postal_codes")
|
|
2612
|
+
|
|
2613
|
+
@_builtins.property
|
|
2614
|
+
@pulumi.getter
|
|
2615
|
+
def provinces(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2616
|
+
"""
|
|
2617
|
+
The province of generated certificates
|
|
2618
|
+
"""
|
|
2619
|
+
return pulumi.get(self, "provinces")
|
|
2620
|
+
|
|
2621
|
+
@_builtins.property
|
|
2622
|
+
@pulumi.getter(name="requireCn")
|
|
2623
|
+
def require_cn(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2624
|
+
"""
|
|
2625
|
+
Flag to force CN usage
|
|
2626
|
+
"""
|
|
2627
|
+
return pulumi.get(self, "require_cn")
|
|
2628
|
+
|
|
2629
|
+
@_builtins.property
|
|
2630
|
+
@pulumi.getter(name="serialNumberSource")
|
|
2631
|
+
def serial_number_source(self) -> pulumi.Output[_builtins.str]:
|
|
2632
|
+
"""
|
|
2633
|
+
Specifies the source of the subject serial number. Valid values are json-csr (default) or json. When set to json-csr, the subject serial number is taken from the serial_number parameter and falls back to the serial number in the CSR. When set to json, the subject serial number is taken from the serial_number parameter but will ignore any value in the CSR. For backwards compatibility an empty value for this field will default to the json-csr behavior.
|
|
2634
|
+
|
|
2635
|
+
Example usage:
|
|
2636
|
+
"""
|
|
2637
|
+
return pulumi.get(self, "serial_number_source")
|
|
2638
|
+
|
|
2639
|
+
@_builtins.property
|
|
2640
|
+
@pulumi.getter(name="serverFlag")
|
|
2641
|
+
def server_flag(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2642
|
+
"""
|
|
2643
|
+
Flag to specify certificates for server use
|
|
2644
|
+
"""
|
|
2645
|
+
return pulumi.get(self, "server_flag")
|
|
2646
|
+
|
|
2647
|
+
@_builtins.property
|
|
2648
|
+
@pulumi.getter(name="signatureBits")
|
|
2649
|
+
def signature_bits(self) -> pulumi.Output[_builtins.int]:
|
|
2650
|
+
"""
|
|
2651
|
+
The number of bits to use in the signature algorithm
|
|
2652
|
+
"""
|
|
2653
|
+
return pulumi.get(self, "signature_bits")
|
|
2654
|
+
|
|
2655
|
+
@_builtins.property
|
|
2656
|
+
@pulumi.getter(name="streetAddresses")
|
|
2657
|
+
def street_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
2658
|
+
"""
|
|
2659
|
+
The street address of generated certificates
|
|
2660
|
+
"""
|
|
2661
|
+
return pulumi.get(self, "street_addresses")
|
|
2662
|
+
|
|
2663
|
+
@_builtins.property
|
|
2664
|
+
@pulumi.getter
|
|
2665
|
+
def ttl(self) -> pulumi.Output[_builtins.str]:
|
|
2666
|
+
"""
|
|
2667
|
+
The TTL, in seconds, for any certificate issued against this role.
|
|
2668
|
+
"""
|
|
2669
|
+
return pulumi.get(self, "ttl")
|
|
2670
|
+
|
|
2671
|
+
@_builtins.property
|
|
2672
|
+
@pulumi.getter(name="useCsrCommonName")
|
|
2673
|
+
def use_csr_common_name(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2674
|
+
"""
|
|
2675
|
+
Flag to use the CN in the CSR
|
|
2676
|
+
"""
|
|
2677
|
+
return pulumi.get(self, "use_csr_common_name")
|
|
2678
|
+
|
|
2679
|
+
@_builtins.property
|
|
2680
|
+
@pulumi.getter(name="useCsrSans")
|
|
2681
|
+
def use_csr_sans(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2682
|
+
"""
|
|
2683
|
+
Flag to use the SANs in the CSR
|
|
2684
|
+
"""
|
|
2685
|
+
return pulumi.get(self, "use_csr_sans")
|
|
2686
|
+
|
|
2687
|
+
@_builtins.property
|
|
2688
|
+
@pulumi.getter(name="usePss")
|
|
2689
|
+
def use_pss(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
2690
|
+
"""
|
|
2691
|
+
Specifies whether or not to use PSS signatures over PKCS#1v1.5 signatures when a RSA-type issuer is used. Ignored for ECDSA/Ed25519 issuers.
|
|
2692
|
+
"""
|
|
2693
|
+
return pulumi.get(self, "use_pss")
|
|
2694
|
+
|