pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1194 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['SecretBackendSignArgs', 'SecretBackendSign']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class SecretBackendSignArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
|
23
|
+
common_name: pulumi.Input[_builtins.str],
|
|
24
|
+
csr: pulumi.Input[_builtins.str],
|
|
25
|
+
alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
auto_renew: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
27
|
+
cert_metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
exclude_cn_from_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
29
|
+
format: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
ip_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
31
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
min_seconds_remaining: Optional[pulumi.Input[_builtins.int]] = None,
|
|
33
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
35
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
36
|
+
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
37
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
38
|
+
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
39
|
+
"""
|
|
40
|
+
The set of arguments for constructing a SecretBackendSign resource.
|
|
41
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
|
42
|
+
:param pulumi.Input[_builtins.str] common_name: CN of certificate to create
|
|
43
|
+
:param pulumi.Input[_builtins.str] csr: The CSR
|
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] alt_names: List of alternative names
|
|
45
|
+
:param pulumi.Input[_builtins.bool] auto_renew: If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
46
|
+
:param pulumi.Input[_builtins.str] cert_metadata: A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
47
|
+
:param pulumi.Input[_builtins.bool] exclude_cn_from_sans: Flag to exclude CN from SANs
|
|
48
|
+
:param pulumi.Input[_builtins.str] format: The format of data
|
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_sans: List of alternative IPs
|
|
50
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. Can
|
|
51
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
52
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
53
|
+
overriding the role's `issuer_ref` value.
|
|
54
|
+
:param pulumi.Input[_builtins.int] min_seconds_remaining: Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
55
|
+
:param pulumi.Input[_builtins.str] name: Name of the role to create the certificate against
|
|
56
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
57
|
+
The value should not contain leading or trailing forward slashes.
|
|
58
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
59
|
+
*Available only for Vault Enterprise*.
|
|
60
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] other_sans: List of other SANs
|
|
62
|
+
:param pulumi.Input[_builtins.str] ttl: Time to live
|
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uri_sans: List of alternative URIs
|
|
64
|
+
"""
|
|
65
|
+
pulumi.set(__self__, "backend", backend)
|
|
66
|
+
pulumi.set(__self__, "common_name", common_name)
|
|
67
|
+
pulumi.set(__self__, "csr", csr)
|
|
68
|
+
if alt_names is not None:
|
|
69
|
+
pulumi.set(__self__, "alt_names", alt_names)
|
|
70
|
+
if auto_renew is not None:
|
|
71
|
+
pulumi.set(__self__, "auto_renew", auto_renew)
|
|
72
|
+
if cert_metadata is not None:
|
|
73
|
+
pulumi.set(__self__, "cert_metadata", cert_metadata)
|
|
74
|
+
if exclude_cn_from_sans is not None:
|
|
75
|
+
pulumi.set(__self__, "exclude_cn_from_sans", exclude_cn_from_sans)
|
|
76
|
+
if format is not None:
|
|
77
|
+
pulumi.set(__self__, "format", format)
|
|
78
|
+
if ip_sans is not None:
|
|
79
|
+
pulumi.set(__self__, "ip_sans", ip_sans)
|
|
80
|
+
if issuer_ref is not None:
|
|
81
|
+
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
|
82
|
+
if min_seconds_remaining is not None:
|
|
83
|
+
pulumi.set(__self__, "min_seconds_remaining", min_seconds_remaining)
|
|
84
|
+
if name is not None:
|
|
85
|
+
pulumi.set(__self__, "name", name)
|
|
86
|
+
if namespace is not None:
|
|
87
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
88
|
+
if not_after is not None:
|
|
89
|
+
pulumi.set(__self__, "not_after", not_after)
|
|
90
|
+
if other_sans is not None:
|
|
91
|
+
pulumi.set(__self__, "other_sans", other_sans)
|
|
92
|
+
if ttl is not None:
|
|
93
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
94
|
+
if uri_sans is not None:
|
|
95
|
+
pulumi.set(__self__, "uri_sans", uri_sans)
|
|
96
|
+
|
|
97
|
+
@_builtins.property
|
|
98
|
+
@pulumi.getter
|
|
99
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
|
100
|
+
"""
|
|
101
|
+
The PKI secret backend the resource belongs to.
|
|
102
|
+
"""
|
|
103
|
+
return pulumi.get(self, "backend")
|
|
104
|
+
|
|
105
|
+
@backend.setter
|
|
106
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
|
107
|
+
pulumi.set(self, "backend", value)
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter(name="commonName")
|
|
111
|
+
def common_name(self) -> pulumi.Input[_builtins.str]:
|
|
112
|
+
"""
|
|
113
|
+
CN of certificate to create
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "common_name")
|
|
116
|
+
|
|
117
|
+
@common_name.setter
|
|
118
|
+
def common_name(self, value: pulumi.Input[_builtins.str]):
|
|
119
|
+
pulumi.set(self, "common_name", value)
|
|
120
|
+
|
|
121
|
+
@_builtins.property
|
|
122
|
+
@pulumi.getter
|
|
123
|
+
def csr(self) -> pulumi.Input[_builtins.str]:
|
|
124
|
+
"""
|
|
125
|
+
The CSR
|
|
126
|
+
"""
|
|
127
|
+
return pulumi.get(self, "csr")
|
|
128
|
+
|
|
129
|
+
@csr.setter
|
|
130
|
+
def csr(self, value: pulumi.Input[_builtins.str]):
|
|
131
|
+
pulumi.set(self, "csr", value)
|
|
132
|
+
|
|
133
|
+
@_builtins.property
|
|
134
|
+
@pulumi.getter(name="altNames")
|
|
135
|
+
def alt_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
136
|
+
"""
|
|
137
|
+
List of alternative names
|
|
138
|
+
"""
|
|
139
|
+
return pulumi.get(self, "alt_names")
|
|
140
|
+
|
|
141
|
+
@alt_names.setter
|
|
142
|
+
def alt_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
143
|
+
pulumi.set(self, "alt_names", value)
|
|
144
|
+
|
|
145
|
+
@_builtins.property
|
|
146
|
+
@pulumi.getter(name="autoRenew")
|
|
147
|
+
def auto_renew(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
148
|
+
"""
|
|
149
|
+
If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
150
|
+
"""
|
|
151
|
+
return pulumi.get(self, "auto_renew")
|
|
152
|
+
|
|
153
|
+
@auto_renew.setter
|
|
154
|
+
def auto_renew(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
155
|
+
pulumi.set(self, "auto_renew", value)
|
|
156
|
+
|
|
157
|
+
@_builtins.property
|
|
158
|
+
@pulumi.getter(name="certMetadata")
|
|
159
|
+
def cert_metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
160
|
+
"""
|
|
161
|
+
A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
162
|
+
"""
|
|
163
|
+
return pulumi.get(self, "cert_metadata")
|
|
164
|
+
|
|
165
|
+
@cert_metadata.setter
|
|
166
|
+
def cert_metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
167
|
+
pulumi.set(self, "cert_metadata", value)
|
|
168
|
+
|
|
169
|
+
@_builtins.property
|
|
170
|
+
@pulumi.getter(name="excludeCnFromSans")
|
|
171
|
+
def exclude_cn_from_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
172
|
+
"""
|
|
173
|
+
Flag to exclude CN from SANs
|
|
174
|
+
"""
|
|
175
|
+
return pulumi.get(self, "exclude_cn_from_sans")
|
|
176
|
+
|
|
177
|
+
@exclude_cn_from_sans.setter
|
|
178
|
+
def exclude_cn_from_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
179
|
+
pulumi.set(self, "exclude_cn_from_sans", value)
|
|
180
|
+
|
|
181
|
+
@_builtins.property
|
|
182
|
+
@pulumi.getter
|
|
183
|
+
def format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
184
|
+
"""
|
|
185
|
+
The format of data
|
|
186
|
+
"""
|
|
187
|
+
return pulumi.get(self, "format")
|
|
188
|
+
|
|
189
|
+
@format.setter
|
|
190
|
+
def format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
191
|
+
pulumi.set(self, "format", value)
|
|
192
|
+
|
|
193
|
+
@_builtins.property
|
|
194
|
+
@pulumi.getter(name="ipSans")
|
|
195
|
+
def ip_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
196
|
+
"""
|
|
197
|
+
List of alternative IPs
|
|
198
|
+
"""
|
|
199
|
+
return pulumi.get(self, "ip_sans")
|
|
200
|
+
|
|
201
|
+
@ip_sans.setter
|
|
202
|
+
def ip_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
203
|
+
pulumi.set(self, "ip_sans", value)
|
|
204
|
+
|
|
205
|
+
@_builtins.property
|
|
206
|
+
@pulumi.getter(name="issuerRef")
|
|
207
|
+
def issuer_ref(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
208
|
+
"""
|
|
209
|
+
Specifies the default issuer of this request. Can
|
|
210
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
211
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
212
|
+
overriding the role's `issuer_ref` value.
|
|
213
|
+
"""
|
|
214
|
+
return pulumi.get(self, "issuer_ref")
|
|
215
|
+
|
|
216
|
+
@issuer_ref.setter
|
|
217
|
+
def issuer_ref(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
218
|
+
pulumi.set(self, "issuer_ref", value)
|
|
219
|
+
|
|
220
|
+
@_builtins.property
|
|
221
|
+
@pulumi.getter(name="minSecondsRemaining")
|
|
222
|
+
def min_seconds_remaining(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
223
|
+
"""
|
|
224
|
+
Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
225
|
+
"""
|
|
226
|
+
return pulumi.get(self, "min_seconds_remaining")
|
|
227
|
+
|
|
228
|
+
@min_seconds_remaining.setter
|
|
229
|
+
def min_seconds_remaining(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
230
|
+
pulumi.set(self, "min_seconds_remaining", value)
|
|
231
|
+
|
|
232
|
+
@_builtins.property
|
|
233
|
+
@pulumi.getter
|
|
234
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
235
|
+
"""
|
|
236
|
+
Name of the role to create the certificate against
|
|
237
|
+
"""
|
|
238
|
+
return pulumi.get(self, "name")
|
|
239
|
+
|
|
240
|
+
@name.setter
|
|
241
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
242
|
+
pulumi.set(self, "name", value)
|
|
243
|
+
|
|
244
|
+
@_builtins.property
|
|
245
|
+
@pulumi.getter
|
|
246
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
247
|
+
"""
|
|
248
|
+
The namespace to provision the resource in.
|
|
249
|
+
The value should not contain leading or trailing forward slashes.
|
|
250
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
251
|
+
*Available only for Vault Enterprise*.
|
|
252
|
+
"""
|
|
253
|
+
return pulumi.get(self, "namespace")
|
|
254
|
+
|
|
255
|
+
@namespace.setter
|
|
256
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
257
|
+
pulumi.set(self, "namespace", value)
|
|
258
|
+
|
|
259
|
+
@_builtins.property
|
|
260
|
+
@pulumi.getter(name="notAfter")
|
|
261
|
+
def not_after(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
262
|
+
"""
|
|
263
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
264
|
+
"""
|
|
265
|
+
return pulumi.get(self, "not_after")
|
|
266
|
+
|
|
267
|
+
@not_after.setter
|
|
268
|
+
def not_after(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
269
|
+
pulumi.set(self, "not_after", value)
|
|
270
|
+
|
|
271
|
+
@_builtins.property
|
|
272
|
+
@pulumi.getter(name="otherSans")
|
|
273
|
+
def other_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
274
|
+
"""
|
|
275
|
+
List of other SANs
|
|
276
|
+
"""
|
|
277
|
+
return pulumi.get(self, "other_sans")
|
|
278
|
+
|
|
279
|
+
@other_sans.setter
|
|
280
|
+
def other_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
281
|
+
pulumi.set(self, "other_sans", value)
|
|
282
|
+
|
|
283
|
+
@_builtins.property
|
|
284
|
+
@pulumi.getter
|
|
285
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
286
|
+
"""
|
|
287
|
+
Time to live
|
|
288
|
+
"""
|
|
289
|
+
return pulumi.get(self, "ttl")
|
|
290
|
+
|
|
291
|
+
@ttl.setter
|
|
292
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
293
|
+
pulumi.set(self, "ttl", value)
|
|
294
|
+
|
|
295
|
+
@_builtins.property
|
|
296
|
+
@pulumi.getter(name="uriSans")
|
|
297
|
+
def uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
298
|
+
"""
|
|
299
|
+
List of alternative URIs
|
|
300
|
+
"""
|
|
301
|
+
return pulumi.get(self, "uri_sans")
|
|
302
|
+
|
|
303
|
+
@uri_sans.setter
|
|
304
|
+
def uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
305
|
+
pulumi.set(self, "uri_sans", value)
|
|
306
|
+
|
|
307
|
+
|
|
308
|
+
@pulumi.input_type
|
|
309
|
+
class _SecretBackendSignState:
|
|
310
|
+
def __init__(__self__, *,
|
|
311
|
+
alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
312
|
+
auto_renew: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
313
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
314
|
+
ca_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
315
|
+
cert_metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
316
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
|
317
|
+
common_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
318
|
+
csr: Optional[pulumi.Input[_builtins.str]] = None,
|
|
319
|
+
exclude_cn_from_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
320
|
+
expiration: Optional[pulumi.Input[_builtins.int]] = None,
|
|
321
|
+
format: Optional[pulumi.Input[_builtins.str]] = None,
|
|
322
|
+
ip_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
323
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
324
|
+
issuing_ca: Optional[pulumi.Input[_builtins.str]] = None,
|
|
325
|
+
min_seconds_remaining: Optional[pulumi.Input[_builtins.int]] = None,
|
|
326
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
327
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
328
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
329
|
+
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
330
|
+
renew_pending: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
331
|
+
serial_number: Optional[pulumi.Input[_builtins.str]] = None,
|
|
332
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
333
|
+
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
334
|
+
"""
|
|
335
|
+
Input properties used for looking up and filtering SecretBackendSign resources.
|
|
336
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] alt_names: List of alternative names
|
|
337
|
+
:param pulumi.Input[_builtins.bool] auto_renew: If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
338
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
|
339
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ca_chains: The CA chain
|
|
340
|
+
:param pulumi.Input[_builtins.str] cert_metadata: A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
341
|
+
:param pulumi.Input[_builtins.str] certificate: The certificate
|
|
342
|
+
:param pulumi.Input[_builtins.str] common_name: CN of certificate to create
|
|
343
|
+
:param pulumi.Input[_builtins.str] csr: The CSR
|
|
344
|
+
:param pulumi.Input[_builtins.bool] exclude_cn_from_sans: Flag to exclude CN from SANs
|
|
345
|
+
:param pulumi.Input[_builtins.int] expiration: The expiration date of the certificate in unix epoch format
|
|
346
|
+
:param pulumi.Input[_builtins.str] format: The format of data
|
|
347
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_sans: List of alternative IPs
|
|
348
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. Can
|
|
349
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
350
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
351
|
+
overriding the role's `issuer_ref` value.
|
|
352
|
+
:param pulumi.Input[_builtins.str] issuing_ca: The issuing CA
|
|
353
|
+
:param pulumi.Input[_builtins.int] min_seconds_remaining: Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
354
|
+
:param pulumi.Input[_builtins.str] name: Name of the role to create the certificate against
|
|
355
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
356
|
+
The value should not contain leading or trailing forward slashes.
|
|
357
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
358
|
+
*Available only for Vault Enterprise*.
|
|
359
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
360
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] other_sans: List of other SANs
|
|
361
|
+
:param pulumi.Input[_builtins.bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
362
|
+
:param pulumi.Input[_builtins.str] serial_number: The certificate's serial number, hex formatted.
|
|
363
|
+
:param pulumi.Input[_builtins.str] ttl: Time to live
|
|
364
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uri_sans: List of alternative URIs
|
|
365
|
+
"""
|
|
366
|
+
if alt_names is not None:
|
|
367
|
+
pulumi.set(__self__, "alt_names", alt_names)
|
|
368
|
+
if auto_renew is not None:
|
|
369
|
+
pulumi.set(__self__, "auto_renew", auto_renew)
|
|
370
|
+
if backend is not None:
|
|
371
|
+
pulumi.set(__self__, "backend", backend)
|
|
372
|
+
if ca_chains is not None:
|
|
373
|
+
pulumi.set(__self__, "ca_chains", ca_chains)
|
|
374
|
+
if cert_metadata is not None:
|
|
375
|
+
pulumi.set(__self__, "cert_metadata", cert_metadata)
|
|
376
|
+
if certificate is not None:
|
|
377
|
+
pulumi.set(__self__, "certificate", certificate)
|
|
378
|
+
if common_name is not None:
|
|
379
|
+
pulumi.set(__self__, "common_name", common_name)
|
|
380
|
+
if csr is not None:
|
|
381
|
+
pulumi.set(__self__, "csr", csr)
|
|
382
|
+
if exclude_cn_from_sans is not None:
|
|
383
|
+
pulumi.set(__self__, "exclude_cn_from_sans", exclude_cn_from_sans)
|
|
384
|
+
if expiration is not None:
|
|
385
|
+
pulumi.set(__self__, "expiration", expiration)
|
|
386
|
+
if format is not None:
|
|
387
|
+
pulumi.set(__self__, "format", format)
|
|
388
|
+
if ip_sans is not None:
|
|
389
|
+
pulumi.set(__self__, "ip_sans", ip_sans)
|
|
390
|
+
if issuer_ref is not None:
|
|
391
|
+
pulumi.set(__self__, "issuer_ref", issuer_ref)
|
|
392
|
+
if issuing_ca is not None:
|
|
393
|
+
pulumi.set(__self__, "issuing_ca", issuing_ca)
|
|
394
|
+
if min_seconds_remaining is not None:
|
|
395
|
+
pulumi.set(__self__, "min_seconds_remaining", min_seconds_remaining)
|
|
396
|
+
if name is not None:
|
|
397
|
+
pulumi.set(__self__, "name", name)
|
|
398
|
+
if namespace is not None:
|
|
399
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
400
|
+
if not_after is not None:
|
|
401
|
+
pulumi.set(__self__, "not_after", not_after)
|
|
402
|
+
if other_sans is not None:
|
|
403
|
+
pulumi.set(__self__, "other_sans", other_sans)
|
|
404
|
+
if renew_pending is not None:
|
|
405
|
+
pulumi.set(__self__, "renew_pending", renew_pending)
|
|
406
|
+
if serial_number is not None:
|
|
407
|
+
pulumi.set(__self__, "serial_number", serial_number)
|
|
408
|
+
if ttl is not None:
|
|
409
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
410
|
+
if uri_sans is not None:
|
|
411
|
+
pulumi.set(__self__, "uri_sans", uri_sans)
|
|
412
|
+
|
|
413
|
+
@_builtins.property
|
|
414
|
+
@pulumi.getter(name="altNames")
|
|
415
|
+
def alt_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
416
|
+
"""
|
|
417
|
+
List of alternative names
|
|
418
|
+
"""
|
|
419
|
+
return pulumi.get(self, "alt_names")
|
|
420
|
+
|
|
421
|
+
@alt_names.setter
|
|
422
|
+
def alt_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
423
|
+
pulumi.set(self, "alt_names", value)
|
|
424
|
+
|
|
425
|
+
@_builtins.property
|
|
426
|
+
@pulumi.getter(name="autoRenew")
|
|
427
|
+
def auto_renew(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
428
|
+
"""
|
|
429
|
+
If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
430
|
+
"""
|
|
431
|
+
return pulumi.get(self, "auto_renew")
|
|
432
|
+
|
|
433
|
+
@auto_renew.setter
|
|
434
|
+
def auto_renew(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
435
|
+
pulumi.set(self, "auto_renew", value)
|
|
436
|
+
|
|
437
|
+
@_builtins.property
|
|
438
|
+
@pulumi.getter
|
|
439
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
440
|
+
"""
|
|
441
|
+
The PKI secret backend the resource belongs to.
|
|
442
|
+
"""
|
|
443
|
+
return pulumi.get(self, "backend")
|
|
444
|
+
|
|
445
|
+
@backend.setter
|
|
446
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
447
|
+
pulumi.set(self, "backend", value)
|
|
448
|
+
|
|
449
|
+
@_builtins.property
|
|
450
|
+
@pulumi.getter(name="caChains")
|
|
451
|
+
def ca_chains(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
452
|
+
"""
|
|
453
|
+
The CA chain
|
|
454
|
+
"""
|
|
455
|
+
return pulumi.get(self, "ca_chains")
|
|
456
|
+
|
|
457
|
+
@ca_chains.setter
|
|
458
|
+
def ca_chains(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
459
|
+
pulumi.set(self, "ca_chains", value)
|
|
460
|
+
|
|
461
|
+
@_builtins.property
|
|
462
|
+
@pulumi.getter(name="certMetadata")
|
|
463
|
+
def cert_metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
464
|
+
"""
|
|
465
|
+
A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
466
|
+
"""
|
|
467
|
+
return pulumi.get(self, "cert_metadata")
|
|
468
|
+
|
|
469
|
+
@cert_metadata.setter
|
|
470
|
+
def cert_metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
471
|
+
pulumi.set(self, "cert_metadata", value)
|
|
472
|
+
|
|
473
|
+
@_builtins.property
|
|
474
|
+
@pulumi.getter
|
|
475
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
476
|
+
"""
|
|
477
|
+
The certificate
|
|
478
|
+
"""
|
|
479
|
+
return pulumi.get(self, "certificate")
|
|
480
|
+
|
|
481
|
+
@certificate.setter
|
|
482
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
483
|
+
pulumi.set(self, "certificate", value)
|
|
484
|
+
|
|
485
|
+
@_builtins.property
|
|
486
|
+
@pulumi.getter(name="commonName")
|
|
487
|
+
def common_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
488
|
+
"""
|
|
489
|
+
CN of certificate to create
|
|
490
|
+
"""
|
|
491
|
+
return pulumi.get(self, "common_name")
|
|
492
|
+
|
|
493
|
+
@common_name.setter
|
|
494
|
+
def common_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
495
|
+
pulumi.set(self, "common_name", value)
|
|
496
|
+
|
|
497
|
+
@_builtins.property
|
|
498
|
+
@pulumi.getter
|
|
499
|
+
def csr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
500
|
+
"""
|
|
501
|
+
The CSR
|
|
502
|
+
"""
|
|
503
|
+
return pulumi.get(self, "csr")
|
|
504
|
+
|
|
505
|
+
@csr.setter
|
|
506
|
+
def csr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
507
|
+
pulumi.set(self, "csr", value)
|
|
508
|
+
|
|
509
|
+
@_builtins.property
|
|
510
|
+
@pulumi.getter(name="excludeCnFromSans")
|
|
511
|
+
def exclude_cn_from_sans(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
512
|
+
"""
|
|
513
|
+
Flag to exclude CN from SANs
|
|
514
|
+
"""
|
|
515
|
+
return pulumi.get(self, "exclude_cn_from_sans")
|
|
516
|
+
|
|
517
|
+
@exclude_cn_from_sans.setter
|
|
518
|
+
def exclude_cn_from_sans(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
519
|
+
pulumi.set(self, "exclude_cn_from_sans", value)
|
|
520
|
+
|
|
521
|
+
@_builtins.property
|
|
522
|
+
@pulumi.getter
|
|
523
|
+
def expiration(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
524
|
+
"""
|
|
525
|
+
The expiration date of the certificate in unix epoch format
|
|
526
|
+
"""
|
|
527
|
+
return pulumi.get(self, "expiration")
|
|
528
|
+
|
|
529
|
+
@expiration.setter
|
|
530
|
+
def expiration(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
531
|
+
pulumi.set(self, "expiration", value)
|
|
532
|
+
|
|
533
|
+
@_builtins.property
|
|
534
|
+
@pulumi.getter
|
|
535
|
+
def format(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
536
|
+
"""
|
|
537
|
+
The format of data
|
|
538
|
+
"""
|
|
539
|
+
return pulumi.get(self, "format")
|
|
540
|
+
|
|
541
|
+
@format.setter
|
|
542
|
+
def format(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
543
|
+
pulumi.set(self, "format", value)
|
|
544
|
+
|
|
545
|
+
@_builtins.property
|
|
546
|
+
@pulumi.getter(name="ipSans")
|
|
547
|
+
def ip_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
548
|
+
"""
|
|
549
|
+
List of alternative IPs
|
|
550
|
+
"""
|
|
551
|
+
return pulumi.get(self, "ip_sans")
|
|
552
|
+
|
|
553
|
+
@ip_sans.setter
|
|
554
|
+
def ip_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
555
|
+
pulumi.set(self, "ip_sans", value)
|
|
556
|
+
|
|
557
|
+
@_builtins.property
|
|
558
|
+
@pulumi.getter(name="issuerRef")
|
|
559
|
+
def issuer_ref(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
560
|
+
"""
|
|
561
|
+
Specifies the default issuer of this request. Can
|
|
562
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
563
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
564
|
+
overriding the role's `issuer_ref` value.
|
|
565
|
+
"""
|
|
566
|
+
return pulumi.get(self, "issuer_ref")
|
|
567
|
+
|
|
568
|
+
@issuer_ref.setter
|
|
569
|
+
def issuer_ref(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
570
|
+
pulumi.set(self, "issuer_ref", value)
|
|
571
|
+
|
|
572
|
+
@_builtins.property
|
|
573
|
+
@pulumi.getter(name="issuingCa")
|
|
574
|
+
def issuing_ca(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
575
|
+
"""
|
|
576
|
+
The issuing CA
|
|
577
|
+
"""
|
|
578
|
+
return pulumi.get(self, "issuing_ca")
|
|
579
|
+
|
|
580
|
+
@issuing_ca.setter
|
|
581
|
+
def issuing_ca(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
582
|
+
pulumi.set(self, "issuing_ca", value)
|
|
583
|
+
|
|
584
|
+
@_builtins.property
|
|
585
|
+
@pulumi.getter(name="minSecondsRemaining")
|
|
586
|
+
def min_seconds_remaining(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
587
|
+
"""
|
|
588
|
+
Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
589
|
+
"""
|
|
590
|
+
return pulumi.get(self, "min_seconds_remaining")
|
|
591
|
+
|
|
592
|
+
@min_seconds_remaining.setter
|
|
593
|
+
def min_seconds_remaining(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
594
|
+
pulumi.set(self, "min_seconds_remaining", value)
|
|
595
|
+
|
|
596
|
+
@_builtins.property
|
|
597
|
+
@pulumi.getter
|
|
598
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
599
|
+
"""
|
|
600
|
+
Name of the role to create the certificate against
|
|
601
|
+
"""
|
|
602
|
+
return pulumi.get(self, "name")
|
|
603
|
+
|
|
604
|
+
@name.setter
|
|
605
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
606
|
+
pulumi.set(self, "name", value)
|
|
607
|
+
|
|
608
|
+
@_builtins.property
|
|
609
|
+
@pulumi.getter
|
|
610
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
611
|
+
"""
|
|
612
|
+
The namespace to provision the resource in.
|
|
613
|
+
The value should not contain leading or trailing forward slashes.
|
|
614
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
615
|
+
*Available only for Vault Enterprise*.
|
|
616
|
+
"""
|
|
617
|
+
return pulumi.get(self, "namespace")
|
|
618
|
+
|
|
619
|
+
@namespace.setter
|
|
620
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
621
|
+
pulumi.set(self, "namespace", value)
|
|
622
|
+
|
|
623
|
+
@_builtins.property
|
|
624
|
+
@pulumi.getter(name="notAfter")
|
|
625
|
+
def not_after(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
626
|
+
"""
|
|
627
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
628
|
+
"""
|
|
629
|
+
return pulumi.get(self, "not_after")
|
|
630
|
+
|
|
631
|
+
@not_after.setter
|
|
632
|
+
def not_after(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
633
|
+
pulumi.set(self, "not_after", value)
|
|
634
|
+
|
|
635
|
+
@_builtins.property
|
|
636
|
+
@pulumi.getter(name="otherSans")
|
|
637
|
+
def other_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
638
|
+
"""
|
|
639
|
+
List of other SANs
|
|
640
|
+
"""
|
|
641
|
+
return pulumi.get(self, "other_sans")
|
|
642
|
+
|
|
643
|
+
@other_sans.setter
|
|
644
|
+
def other_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
645
|
+
pulumi.set(self, "other_sans", value)
|
|
646
|
+
|
|
647
|
+
@_builtins.property
|
|
648
|
+
@pulumi.getter(name="renewPending")
|
|
649
|
+
def renew_pending(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
650
|
+
"""
|
|
651
|
+
`true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
652
|
+
"""
|
|
653
|
+
return pulumi.get(self, "renew_pending")
|
|
654
|
+
|
|
655
|
+
@renew_pending.setter
|
|
656
|
+
def renew_pending(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
657
|
+
pulumi.set(self, "renew_pending", value)
|
|
658
|
+
|
|
659
|
+
@_builtins.property
|
|
660
|
+
@pulumi.getter(name="serialNumber")
|
|
661
|
+
def serial_number(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
662
|
+
"""
|
|
663
|
+
The certificate's serial number, hex formatted.
|
|
664
|
+
"""
|
|
665
|
+
return pulumi.get(self, "serial_number")
|
|
666
|
+
|
|
667
|
+
@serial_number.setter
|
|
668
|
+
def serial_number(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
669
|
+
pulumi.set(self, "serial_number", value)
|
|
670
|
+
|
|
671
|
+
@_builtins.property
|
|
672
|
+
@pulumi.getter
|
|
673
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
674
|
+
"""
|
|
675
|
+
Time to live
|
|
676
|
+
"""
|
|
677
|
+
return pulumi.get(self, "ttl")
|
|
678
|
+
|
|
679
|
+
@ttl.setter
|
|
680
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
681
|
+
pulumi.set(self, "ttl", value)
|
|
682
|
+
|
|
683
|
+
@_builtins.property
|
|
684
|
+
@pulumi.getter(name="uriSans")
|
|
685
|
+
def uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
686
|
+
"""
|
|
687
|
+
List of alternative URIs
|
|
688
|
+
"""
|
|
689
|
+
return pulumi.get(self, "uri_sans")
|
|
690
|
+
|
|
691
|
+
@uri_sans.setter
|
|
692
|
+
def uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
693
|
+
pulumi.set(self, "uri_sans", value)
|
|
694
|
+
|
|
695
|
+
|
|
696
|
+
@pulumi.type_token("vault:pkiSecret/secretBackendSign:SecretBackendSign")
|
|
697
|
+
class SecretBackendSign(pulumi.CustomResource):
|
|
698
|
+
@overload
|
|
699
|
+
def __init__(__self__,
|
|
700
|
+
resource_name: str,
|
|
701
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
702
|
+
alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
703
|
+
auto_renew: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
704
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
705
|
+
cert_metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
706
|
+
common_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
707
|
+
csr: Optional[pulumi.Input[_builtins.str]] = None,
|
|
708
|
+
exclude_cn_from_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
709
|
+
format: Optional[pulumi.Input[_builtins.str]] = None,
|
|
710
|
+
ip_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
711
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
712
|
+
min_seconds_remaining: Optional[pulumi.Input[_builtins.int]] = None,
|
|
713
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
714
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
715
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
716
|
+
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
717
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
718
|
+
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
719
|
+
__props__=None):
|
|
720
|
+
"""
|
|
721
|
+
## Example Usage
|
|
722
|
+
|
|
723
|
+
```python
|
|
724
|
+
import pulumi
|
|
725
|
+
import pulumi_vault as vault
|
|
726
|
+
|
|
727
|
+
test = vault.pkisecret.SecretBackendSign("test",
|
|
728
|
+
backend=pki["path"],
|
|
729
|
+
name=admin["name"],
|
|
730
|
+
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
|
731
|
+
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
|
732
|
+
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
|
733
|
+
dC50ZXN0Lm15LmRvbWFpbjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
|
|
734
|
+
AJupYCQ8UVCWII1Zof1c6YcSSaM9hEaDU78cfKP5RoSeH10BvrWRfT+mzCONVpNP
|
|
735
|
+
CW9Iabtvk6hm0ot6ilnndEyVJbc0g7hdDLBX5BM25D+DGZGJRKUz1V+uBrWmXtIt
|
|
736
|
+
Vonj7JTDTe7ViH0GDsB7CvqXFGXO2a2cDYBchLkL6vQiFPshxvUsLtwxuy/qdYgy
|
|
737
|
+
X6ya+AUoZcoQGy1XxNjfH6cPtWSWQGEp1oPR6vL9hU3laTZb3C+VV4jZem+he8/0
|
|
738
|
+
V+qV6fLG92WTXm2hmf8nrtUqqJ+C7mW/RJod+TviviBadIX0OHXW7k5HVsZood01
|
|
739
|
+
te8vMRUNJNiZfa9EMIK5oncbQn0LcM3Wo9VrjpL7jREb/4HCS2gswYGv7hzk9cCS
|
|
740
|
+
kVY4rDucchKbApuI3kfzmO7GFOF5eiSkYZpY/czNn7VVM3WCu6dpOX4+3rhgrZQw
|
|
741
|
+
kY14L930DaLVRUgve/zKVP2D2GHdEOs+MbV7s96UgigT9pXly/yHPj+1sSYqmnaD
|
|
742
|
+
5b7jSeJusmzO/nrwXVGLsnezR87VzHl9Ux9g5s6zh+R+PrZuVxYsLvoUpaasH47O
|
|
743
|
+
gIcBzSb/6pSGZKAUizmYsHsR1k88dAvsQ+FsUDaNokdi9VndEB4QPmiFmjyLV+0I
|
|
744
|
+
1TFoXop4sW11NPz1YCq+IxnYrEaIN3PyhY0GvBJDFY1/AgMBAAGgADANBgkqhkiG
|
|
745
|
+
9w0BAQsFAAOCAgEActuqnqS8Y9UF7e08w7tR3FPzGecWreuvxILrlFEZJxiLPFqL
|
|
746
|
+
It7uJvtypCVQvz6UQzKdBYO7tMpRaWViB8DrWzXNZjLMrg+QHcpveg8C0Ett4scG
|
|
747
|
+
fnvLk6fTDFYrnGvwHTqiHos5i0y3bFLyS1BGwSpdLAykGtvC+VM8mRyw/Y7CPcKN
|
|
748
|
+
77kebY/9xduW1g2uxWLr0x90RuQDv9psPojT+59tRLGSp5Kt0IeD3QtnAZEFE4aN
|
|
749
|
+
vt+Pd69eg3BgZ8ZeDgoqAw3yppvOkpAFiE5pw2qPZaM4SRphl4d2Lek2zNIMyZqv
|
|
750
|
+
do5zh356HOgXtDaSg0POnRGrN/Ua+LMCRTg6GEPUnx9uQb/zt8Zu0hIexDGyykp1
|
|
751
|
+
OGqtWlv/Nc8UYuS38v0BeB6bMPeoqQUjkqs8nHlAEFn0KlgYdtDC+7SdQx6wS4te
|
|
752
|
+
dBKRNDfC4lS3jYJgs55jHqonZgkpSi3bamlxpfpW0ukGBcmq91wRe4bOw/4uD/vf
|
|
753
|
+
UwqMWOdCYcU3mdYNjTWy22ORW3SGFQxMBwpUEURCSoeqWr6aJeQ7KAYkx1PrB5T8
|
|
754
|
+
OTEc13lWf+B0PU9UJuGTsmpIuImPDVd0EVDayr3mT5dDbqTVDbe8ppf2IswABmf0
|
|
755
|
+
o3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=
|
|
756
|
+
-----END CERTIFICATE REQUEST-----
|
|
757
|
+
\"\"\",
|
|
758
|
+
common_name="test.my.domain",
|
|
759
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
|
760
|
+
```
|
|
761
|
+
|
|
762
|
+
:param str resource_name: The name of the resource.
|
|
763
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
764
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] alt_names: List of alternative names
|
|
765
|
+
:param pulumi.Input[_builtins.bool] auto_renew: If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
766
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
|
767
|
+
:param pulumi.Input[_builtins.str] cert_metadata: A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
768
|
+
:param pulumi.Input[_builtins.str] common_name: CN of certificate to create
|
|
769
|
+
:param pulumi.Input[_builtins.str] csr: The CSR
|
|
770
|
+
:param pulumi.Input[_builtins.bool] exclude_cn_from_sans: Flag to exclude CN from SANs
|
|
771
|
+
:param pulumi.Input[_builtins.str] format: The format of data
|
|
772
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_sans: List of alternative IPs
|
|
773
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. Can
|
|
774
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
775
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
776
|
+
overriding the role's `issuer_ref` value.
|
|
777
|
+
:param pulumi.Input[_builtins.int] min_seconds_remaining: Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
778
|
+
:param pulumi.Input[_builtins.str] name: Name of the role to create the certificate against
|
|
779
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
780
|
+
The value should not contain leading or trailing forward slashes.
|
|
781
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
782
|
+
*Available only for Vault Enterprise*.
|
|
783
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
784
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] other_sans: List of other SANs
|
|
785
|
+
:param pulumi.Input[_builtins.str] ttl: Time to live
|
|
786
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uri_sans: List of alternative URIs
|
|
787
|
+
"""
|
|
788
|
+
...
|
|
789
|
+
@overload
|
|
790
|
+
def __init__(__self__,
|
|
791
|
+
resource_name: str,
|
|
792
|
+
args: SecretBackendSignArgs,
|
|
793
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
794
|
+
"""
|
|
795
|
+
## Example Usage
|
|
796
|
+
|
|
797
|
+
```python
|
|
798
|
+
import pulumi
|
|
799
|
+
import pulumi_vault as vault
|
|
800
|
+
|
|
801
|
+
test = vault.pkisecret.SecretBackendSign("test",
|
|
802
|
+
backend=pki["path"],
|
|
803
|
+
name=admin["name"],
|
|
804
|
+
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
|
805
|
+
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
|
806
|
+
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
|
807
|
+
dC50ZXN0Lm15LmRvbWFpbjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
|
|
808
|
+
AJupYCQ8UVCWII1Zof1c6YcSSaM9hEaDU78cfKP5RoSeH10BvrWRfT+mzCONVpNP
|
|
809
|
+
CW9Iabtvk6hm0ot6ilnndEyVJbc0g7hdDLBX5BM25D+DGZGJRKUz1V+uBrWmXtIt
|
|
810
|
+
Vonj7JTDTe7ViH0GDsB7CvqXFGXO2a2cDYBchLkL6vQiFPshxvUsLtwxuy/qdYgy
|
|
811
|
+
X6ya+AUoZcoQGy1XxNjfH6cPtWSWQGEp1oPR6vL9hU3laTZb3C+VV4jZem+he8/0
|
|
812
|
+
V+qV6fLG92WTXm2hmf8nrtUqqJ+C7mW/RJod+TviviBadIX0OHXW7k5HVsZood01
|
|
813
|
+
te8vMRUNJNiZfa9EMIK5oncbQn0LcM3Wo9VrjpL7jREb/4HCS2gswYGv7hzk9cCS
|
|
814
|
+
kVY4rDucchKbApuI3kfzmO7GFOF5eiSkYZpY/czNn7VVM3WCu6dpOX4+3rhgrZQw
|
|
815
|
+
kY14L930DaLVRUgve/zKVP2D2GHdEOs+MbV7s96UgigT9pXly/yHPj+1sSYqmnaD
|
|
816
|
+
5b7jSeJusmzO/nrwXVGLsnezR87VzHl9Ux9g5s6zh+R+PrZuVxYsLvoUpaasH47O
|
|
817
|
+
gIcBzSb/6pSGZKAUizmYsHsR1k88dAvsQ+FsUDaNokdi9VndEB4QPmiFmjyLV+0I
|
|
818
|
+
1TFoXop4sW11NPz1YCq+IxnYrEaIN3PyhY0GvBJDFY1/AgMBAAGgADANBgkqhkiG
|
|
819
|
+
9w0BAQsFAAOCAgEActuqnqS8Y9UF7e08w7tR3FPzGecWreuvxILrlFEZJxiLPFqL
|
|
820
|
+
It7uJvtypCVQvz6UQzKdBYO7tMpRaWViB8DrWzXNZjLMrg+QHcpveg8C0Ett4scG
|
|
821
|
+
fnvLk6fTDFYrnGvwHTqiHos5i0y3bFLyS1BGwSpdLAykGtvC+VM8mRyw/Y7CPcKN
|
|
822
|
+
77kebY/9xduW1g2uxWLr0x90RuQDv9psPojT+59tRLGSp5Kt0IeD3QtnAZEFE4aN
|
|
823
|
+
vt+Pd69eg3BgZ8ZeDgoqAw3yppvOkpAFiE5pw2qPZaM4SRphl4d2Lek2zNIMyZqv
|
|
824
|
+
do5zh356HOgXtDaSg0POnRGrN/Ua+LMCRTg6GEPUnx9uQb/zt8Zu0hIexDGyykp1
|
|
825
|
+
OGqtWlv/Nc8UYuS38v0BeB6bMPeoqQUjkqs8nHlAEFn0KlgYdtDC+7SdQx6wS4te
|
|
826
|
+
dBKRNDfC4lS3jYJgs55jHqonZgkpSi3bamlxpfpW0ukGBcmq91wRe4bOw/4uD/vf
|
|
827
|
+
UwqMWOdCYcU3mdYNjTWy22ORW3SGFQxMBwpUEURCSoeqWr6aJeQ7KAYkx1PrB5T8
|
|
828
|
+
OTEc13lWf+B0PU9UJuGTsmpIuImPDVd0EVDayr3mT5dDbqTVDbe8ppf2IswABmf0
|
|
829
|
+
o3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=
|
|
830
|
+
-----END CERTIFICATE REQUEST-----
|
|
831
|
+
\"\"\",
|
|
832
|
+
common_name="test.my.domain",
|
|
833
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
|
834
|
+
```
|
|
835
|
+
|
|
836
|
+
:param str resource_name: The name of the resource.
|
|
837
|
+
:param SecretBackendSignArgs args: The arguments to use to populate this resource's properties.
|
|
838
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
839
|
+
"""
|
|
840
|
+
...
|
|
841
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
842
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretBackendSignArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
843
|
+
if resource_args is not None:
|
|
844
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
845
|
+
else:
|
|
846
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
847
|
+
|
|
848
|
+
def _internal_init(__self__,
|
|
849
|
+
resource_name: str,
|
|
850
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
851
|
+
alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
852
|
+
auto_renew: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
853
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
854
|
+
cert_metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
855
|
+
common_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
856
|
+
csr: Optional[pulumi.Input[_builtins.str]] = None,
|
|
857
|
+
exclude_cn_from_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
858
|
+
format: Optional[pulumi.Input[_builtins.str]] = None,
|
|
859
|
+
ip_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
860
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
861
|
+
min_seconds_remaining: Optional[pulumi.Input[_builtins.int]] = None,
|
|
862
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
863
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
864
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
865
|
+
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
866
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
867
|
+
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
868
|
+
__props__=None):
|
|
869
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
870
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
871
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
872
|
+
if opts.id is None:
|
|
873
|
+
if __props__ is not None:
|
|
874
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
875
|
+
__props__ = SecretBackendSignArgs.__new__(SecretBackendSignArgs)
|
|
876
|
+
|
|
877
|
+
__props__.__dict__["alt_names"] = alt_names
|
|
878
|
+
__props__.__dict__["auto_renew"] = auto_renew
|
|
879
|
+
if backend is None and not opts.urn:
|
|
880
|
+
raise TypeError("Missing required property 'backend'")
|
|
881
|
+
__props__.__dict__["backend"] = backend
|
|
882
|
+
__props__.__dict__["cert_metadata"] = cert_metadata
|
|
883
|
+
if common_name is None and not opts.urn:
|
|
884
|
+
raise TypeError("Missing required property 'common_name'")
|
|
885
|
+
__props__.__dict__["common_name"] = common_name
|
|
886
|
+
if csr is None and not opts.urn:
|
|
887
|
+
raise TypeError("Missing required property 'csr'")
|
|
888
|
+
__props__.__dict__["csr"] = csr
|
|
889
|
+
__props__.__dict__["exclude_cn_from_sans"] = exclude_cn_from_sans
|
|
890
|
+
__props__.__dict__["format"] = format
|
|
891
|
+
__props__.__dict__["ip_sans"] = ip_sans
|
|
892
|
+
__props__.__dict__["issuer_ref"] = issuer_ref
|
|
893
|
+
__props__.__dict__["min_seconds_remaining"] = min_seconds_remaining
|
|
894
|
+
__props__.__dict__["name"] = name
|
|
895
|
+
__props__.__dict__["namespace"] = namespace
|
|
896
|
+
__props__.__dict__["not_after"] = not_after
|
|
897
|
+
__props__.__dict__["other_sans"] = other_sans
|
|
898
|
+
__props__.__dict__["ttl"] = ttl
|
|
899
|
+
__props__.__dict__["uri_sans"] = uri_sans
|
|
900
|
+
__props__.__dict__["ca_chains"] = None
|
|
901
|
+
__props__.__dict__["certificate"] = None
|
|
902
|
+
__props__.__dict__["expiration"] = None
|
|
903
|
+
__props__.__dict__["issuing_ca"] = None
|
|
904
|
+
__props__.__dict__["renew_pending"] = None
|
|
905
|
+
__props__.__dict__["serial_number"] = None
|
|
906
|
+
super(SecretBackendSign, __self__).__init__(
|
|
907
|
+
'vault:pkiSecret/secretBackendSign:SecretBackendSign',
|
|
908
|
+
resource_name,
|
|
909
|
+
__props__,
|
|
910
|
+
opts)
|
|
911
|
+
|
|
912
|
+
@staticmethod
|
|
913
|
+
def get(resource_name: str,
|
|
914
|
+
id: pulumi.Input[str],
|
|
915
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
916
|
+
alt_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
917
|
+
auto_renew: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
918
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
919
|
+
ca_chains: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
920
|
+
cert_metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
921
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
|
922
|
+
common_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
923
|
+
csr: Optional[pulumi.Input[_builtins.str]] = None,
|
|
924
|
+
exclude_cn_from_sans: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
925
|
+
expiration: Optional[pulumi.Input[_builtins.int]] = None,
|
|
926
|
+
format: Optional[pulumi.Input[_builtins.str]] = None,
|
|
927
|
+
ip_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
928
|
+
issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
929
|
+
issuing_ca: Optional[pulumi.Input[_builtins.str]] = None,
|
|
930
|
+
min_seconds_remaining: Optional[pulumi.Input[_builtins.int]] = None,
|
|
931
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
932
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
933
|
+
not_after: Optional[pulumi.Input[_builtins.str]] = None,
|
|
934
|
+
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
935
|
+
renew_pending: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
936
|
+
serial_number: Optional[pulumi.Input[_builtins.str]] = None,
|
|
937
|
+
ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
938
|
+
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretBackendSign':
|
|
939
|
+
"""
|
|
940
|
+
Get an existing SecretBackendSign resource's state with the given name, id, and optional extra
|
|
941
|
+
properties used to qualify the lookup.
|
|
942
|
+
|
|
943
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
944
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
945
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
946
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] alt_names: List of alternative names
|
|
947
|
+
:param pulumi.Input[_builtins.bool] auto_renew: If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
948
|
+
:param pulumi.Input[_builtins.str] backend: The PKI secret backend the resource belongs to.
|
|
949
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ca_chains: The CA chain
|
|
950
|
+
:param pulumi.Input[_builtins.str] cert_metadata: A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
951
|
+
:param pulumi.Input[_builtins.str] certificate: The certificate
|
|
952
|
+
:param pulumi.Input[_builtins.str] common_name: CN of certificate to create
|
|
953
|
+
:param pulumi.Input[_builtins.str] csr: The CSR
|
|
954
|
+
:param pulumi.Input[_builtins.bool] exclude_cn_from_sans: Flag to exclude CN from SANs
|
|
955
|
+
:param pulumi.Input[_builtins.int] expiration: The expiration date of the certificate in unix epoch format
|
|
956
|
+
:param pulumi.Input[_builtins.str] format: The format of data
|
|
957
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_sans: List of alternative IPs
|
|
958
|
+
:param pulumi.Input[_builtins.str] issuer_ref: Specifies the default issuer of this request. Can
|
|
959
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
960
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
961
|
+
overriding the role's `issuer_ref` value.
|
|
962
|
+
:param pulumi.Input[_builtins.str] issuing_ca: The issuing CA
|
|
963
|
+
:param pulumi.Input[_builtins.int] min_seconds_remaining: Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
964
|
+
:param pulumi.Input[_builtins.str] name: Name of the role to create the certificate against
|
|
965
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
966
|
+
The value should not contain leading or trailing forward slashes.
|
|
967
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
968
|
+
*Available only for Vault Enterprise*.
|
|
969
|
+
:param pulumi.Input[_builtins.str] not_after: Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
970
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] other_sans: List of other SANs
|
|
971
|
+
:param pulumi.Input[_builtins.bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
972
|
+
:param pulumi.Input[_builtins.str] serial_number: The certificate's serial number, hex formatted.
|
|
973
|
+
:param pulumi.Input[_builtins.str] ttl: Time to live
|
|
974
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uri_sans: List of alternative URIs
|
|
975
|
+
"""
|
|
976
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
977
|
+
|
|
978
|
+
__props__ = _SecretBackendSignState.__new__(_SecretBackendSignState)
|
|
979
|
+
|
|
980
|
+
__props__.__dict__["alt_names"] = alt_names
|
|
981
|
+
__props__.__dict__["auto_renew"] = auto_renew
|
|
982
|
+
__props__.__dict__["backend"] = backend
|
|
983
|
+
__props__.__dict__["ca_chains"] = ca_chains
|
|
984
|
+
__props__.__dict__["cert_metadata"] = cert_metadata
|
|
985
|
+
__props__.__dict__["certificate"] = certificate
|
|
986
|
+
__props__.__dict__["common_name"] = common_name
|
|
987
|
+
__props__.__dict__["csr"] = csr
|
|
988
|
+
__props__.__dict__["exclude_cn_from_sans"] = exclude_cn_from_sans
|
|
989
|
+
__props__.__dict__["expiration"] = expiration
|
|
990
|
+
__props__.__dict__["format"] = format
|
|
991
|
+
__props__.__dict__["ip_sans"] = ip_sans
|
|
992
|
+
__props__.__dict__["issuer_ref"] = issuer_ref
|
|
993
|
+
__props__.__dict__["issuing_ca"] = issuing_ca
|
|
994
|
+
__props__.__dict__["min_seconds_remaining"] = min_seconds_remaining
|
|
995
|
+
__props__.__dict__["name"] = name
|
|
996
|
+
__props__.__dict__["namespace"] = namespace
|
|
997
|
+
__props__.__dict__["not_after"] = not_after
|
|
998
|
+
__props__.__dict__["other_sans"] = other_sans
|
|
999
|
+
__props__.__dict__["renew_pending"] = renew_pending
|
|
1000
|
+
__props__.__dict__["serial_number"] = serial_number
|
|
1001
|
+
__props__.__dict__["ttl"] = ttl
|
|
1002
|
+
__props__.__dict__["uri_sans"] = uri_sans
|
|
1003
|
+
return SecretBackendSign(resource_name, opts=opts, __props__=__props__)
|
|
1004
|
+
|
|
1005
|
+
@_builtins.property
|
|
1006
|
+
@pulumi.getter(name="altNames")
|
|
1007
|
+
def alt_names(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1008
|
+
"""
|
|
1009
|
+
List of alternative names
|
|
1010
|
+
"""
|
|
1011
|
+
return pulumi.get(self, "alt_names")
|
|
1012
|
+
|
|
1013
|
+
@_builtins.property
|
|
1014
|
+
@pulumi.getter(name="autoRenew")
|
|
1015
|
+
def auto_renew(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1016
|
+
"""
|
|
1017
|
+
If set to `true`, certs will be renewed if the expiration is within `min_seconds_remaining`. Default `false`
|
|
1018
|
+
"""
|
|
1019
|
+
return pulumi.get(self, "auto_renew")
|
|
1020
|
+
|
|
1021
|
+
@_builtins.property
|
|
1022
|
+
@pulumi.getter
|
|
1023
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
|
1024
|
+
"""
|
|
1025
|
+
The PKI secret backend the resource belongs to.
|
|
1026
|
+
"""
|
|
1027
|
+
return pulumi.get(self, "backend")
|
|
1028
|
+
|
|
1029
|
+
@_builtins.property
|
|
1030
|
+
@pulumi.getter(name="caChains")
|
|
1031
|
+
def ca_chains(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
1032
|
+
"""
|
|
1033
|
+
The CA chain
|
|
1034
|
+
"""
|
|
1035
|
+
return pulumi.get(self, "ca_chains")
|
|
1036
|
+
|
|
1037
|
+
@_builtins.property
|
|
1038
|
+
@pulumi.getter(name="certMetadata")
|
|
1039
|
+
def cert_metadata(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1040
|
+
"""
|
|
1041
|
+
A base 64 encoded value or an empty string to associate with the certificate's serial number. The role's no_store_metadata must be set to false, otherwise an error is returned when specified.
|
|
1042
|
+
"""
|
|
1043
|
+
return pulumi.get(self, "cert_metadata")
|
|
1044
|
+
|
|
1045
|
+
@_builtins.property
|
|
1046
|
+
@pulumi.getter
|
|
1047
|
+
def certificate(self) -> pulumi.Output[_builtins.str]:
|
|
1048
|
+
"""
|
|
1049
|
+
The certificate
|
|
1050
|
+
"""
|
|
1051
|
+
return pulumi.get(self, "certificate")
|
|
1052
|
+
|
|
1053
|
+
@_builtins.property
|
|
1054
|
+
@pulumi.getter(name="commonName")
|
|
1055
|
+
def common_name(self) -> pulumi.Output[_builtins.str]:
|
|
1056
|
+
"""
|
|
1057
|
+
CN of certificate to create
|
|
1058
|
+
"""
|
|
1059
|
+
return pulumi.get(self, "common_name")
|
|
1060
|
+
|
|
1061
|
+
@_builtins.property
|
|
1062
|
+
@pulumi.getter
|
|
1063
|
+
def csr(self) -> pulumi.Output[_builtins.str]:
|
|
1064
|
+
"""
|
|
1065
|
+
The CSR
|
|
1066
|
+
"""
|
|
1067
|
+
return pulumi.get(self, "csr")
|
|
1068
|
+
|
|
1069
|
+
@_builtins.property
|
|
1070
|
+
@pulumi.getter(name="excludeCnFromSans")
|
|
1071
|
+
def exclude_cn_from_sans(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1072
|
+
"""
|
|
1073
|
+
Flag to exclude CN from SANs
|
|
1074
|
+
"""
|
|
1075
|
+
return pulumi.get(self, "exclude_cn_from_sans")
|
|
1076
|
+
|
|
1077
|
+
@_builtins.property
|
|
1078
|
+
@pulumi.getter
|
|
1079
|
+
def expiration(self) -> pulumi.Output[_builtins.int]:
|
|
1080
|
+
"""
|
|
1081
|
+
The expiration date of the certificate in unix epoch format
|
|
1082
|
+
"""
|
|
1083
|
+
return pulumi.get(self, "expiration")
|
|
1084
|
+
|
|
1085
|
+
@_builtins.property
|
|
1086
|
+
@pulumi.getter
|
|
1087
|
+
def format(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1088
|
+
"""
|
|
1089
|
+
The format of data
|
|
1090
|
+
"""
|
|
1091
|
+
return pulumi.get(self, "format")
|
|
1092
|
+
|
|
1093
|
+
@_builtins.property
|
|
1094
|
+
@pulumi.getter(name="ipSans")
|
|
1095
|
+
def ip_sans(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1096
|
+
"""
|
|
1097
|
+
List of alternative IPs
|
|
1098
|
+
"""
|
|
1099
|
+
return pulumi.get(self, "ip_sans")
|
|
1100
|
+
|
|
1101
|
+
@_builtins.property
|
|
1102
|
+
@pulumi.getter(name="issuerRef")
|
|
1103
|
+
def issuer_ref(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1104
|
+
"""
|
|
1105
|
+
Specifies the default issuer of this request. Can
|
|
1106
|
+
be the value `default`, a name, or an issuer ID. Use ACLs to prevent access to
|
|
1107
|
+
the `/pki/issuer/:issuer_ref/{issue,sign}/:name` paths to prevent users
|
|
1108
|
+
overriding the role's `issuer_ref` value.
|
|
1109
|
+
"""
|
|
1110
|
+
return pulumi.get(self, "issuer_ref")
|
|
1111
|
+
|
|
1112
|
+
@_builtins.property
|
|
1113
|
+
@pulumi.getter(name="issuingCa")
|
|
1114
|
+
def issuing_ca(self) -> pulumi.Output[_builtins.str]:
|
|
1115
|
+
"""
|
|
1116
|
+
The issuing CA
|
|
1117
|
+
"""
|
|
1118
|
+
return pulumi.get(self, "issuing_ca")
|
|
1119
|
+
|
|
1120
|
+
@_builtins.property
|
|
1121
|
+
@pulumi.getter(name="minSecondsRemaining")
|
|
1122
|
+
def min_seconds_remaining(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1123
|
+
"""
|
|
1124
|
+
Generate a new certificate when the expiration is within this number of seconds, default is 604800 (7 days)
|
|
1125
|
+
"""
|
|
1126
|
+
return pulumi.get(self, "min_seconds_remaining")
|
|
1127
|
+
|
|
1128
|
+
@_builtins.property
|
|
1129
|
+
@pulumi.getter
|
|
1130
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
1131
|
+
"""
|
|
1132
|
+
Name of the role to create the certificate against
|
|
1133
|
+
"""
|
|
1134
|
+
return pulumi.get(self, "name")
|
|
1135
|
+
|
|
1136
|
+
@_builtins.property
|
|
1137
|
+
@pulumi.getter
|
|
1138
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1139
|
+
"""
|
|
1140
|
+
The namespace to provision the resource in.
|
|
1141
|
+
The value should not contain leading or trailing forward slashes.
|
|
1142
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1143
|
+
*Available only for Vault Enterprise*.
|
|
1144
|
+
"""
|
|
1145
|
+
return pulumi.get(self, "namespace")
|
|
1146
|
+
|
|
1147
|
+
@_builtins.property
|
|
1148
|
+
@pulumi.getter(name="notAfter")
|
|
1149
|
+
def not_after(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1150
|
+
"""
|
|
1151
|
+
Set the Not After field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ. Supports the Y10K end date for IEEE 802.1AR-2018 standard devices, 9999-12-31T23:59:59Z.
|
|
1152
|
+
"""
|
|
1153
|
+
return pulumi.get(self, "not_after")
|
|
1154
|
+
|
|
1155
|
+
@_builtins.property
|
|
1156
|
+
@pulumi.getter(name="otherSans")
|
|
1157
|
+
def other_sans(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1158
|
+
"""
|
|
1159
|
+
List of other SANs
|
|
1160
|
+
"""
|
|
1161
|
+
return pulumi.get(self, "other_sans")
|
|
1162
|
+
|
|
1163
|
+
@_builtins.property
|
|
1164
|
+
@pulumi.getter(name="renewPending")
|
|
1165
|
+
def renew_pending(self) -> pulumi.Output[_builtins.bool]:
|
|
1166
|
+
"""
|
|
1167
|
+
`true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
1168
|
+
"""
|
|
1169
|
+
return pulumi.get(self, "renew_pending")
|
|
1170
|
+
|
|
1171
|
+
@_builtins.property
|
|
1172
|
+
@pulumi.getter(name="serialNumber")
|
|
1173
|
+
def serial_number(self) -> pulumi.Output[_builtins.str]:
|
|
1174
|
+
"""
|
|
1175
|
+
The certificate's serial number, hex formatted.
|
|
1176
|
+
"""
|
|
1177
|
+
return pulumi.get(self, "serial_number")
|
|
1178
|
+
|
|
1179
|
+
@_builtins.property
|
|
1180
|
+
@pulumi.getter
|
|
1181
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1182
|
+
"""
|
|
1183
|
+
Time to live
|
|
1184
|
+
"""
|
|
1185
|
+
return pulumi.get(self, "ttl")
|
|
1186
|
+
|
|
1187
|
+
@_builtins.property
|
|
1188
|
+
@pulumi.getter(name="uriSans")
|
|
1189
|
+
def uri_sans(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1190
|
+
"""
|
|
1191
|
+
List of alternative URIs
|
|
1192
|
+
"""
|
|
1193
|
+
return pulumi.get(self, "uri_sans")
|
|
1194
|
+
|