SecretBackendCrlConfig

Allows setting the duration for which the generated CRL should be marked valid. If the CRL is disabled, it will return a signed but zero-length CRL for any request. If enabled, it will re-build the CRL.

Example Usage

using Pulumi;
using Vault = Pulumi.Vault;

class MyStack : Stack
{
    public MyStack()
    {
        var pki = new Vault.Mount("pki", new Vault.MountArgs
        {
            Path = "%s",
            Type = "pki",
            DefaultLeaseTtlSeconds = 3600,
            MaxLeaseTtlSeconds = 86400,
        });
        var crlConfig = new Vault.PkiSecret.SecretBackendCrlConfig("crlConfig", new Vault.PkiSecret.SecretBackendCrlConfigArgs
        {
            Backend = pki.Path,
            Expiry = "72h",
            Disable = false,
        });
    }

}
package main

import (
	"fmt"

	"github.com/pulumi/pulumi-vault/sdk/v4/go/vault"
	"github.com/pulumi/pulumi-vault/sdk/v4/go/vault/pkiSecret"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
			Path:                   pulumi.String(fmt.Sprintf("%v%v", "%", "s")),
			Type:                   pulumi.String("pki"),
			DefaultLeaseTtlSeconds: pulumi.Int(3600),
			MaxLeaseTtlSeconds:     pulumi.Int(86400),
		})
		if err != nil {
			return err
		}
		_, err = pkiSecret.NewSecretBackendCrlConfig(ctx, "crlConfig", &pkiSecret.SecretBackendCrlConfigArgs{
			Backend: pki.Path,
			Expiry:  pulumi.String("72h"),
			Disable: pulumi.Bool(false),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
import pulumi
import pulumi_vault as vault

pki = vault.Mount("pki",
    path="%s",
    type="pki",
    default_lease_ttl_seconds=3600,
    max_lease_ttl_seconds=86400)
crl_config = vault.pki_secret.SecretBackendCrlConfig("crlConfig",
    backend=pki.path,
    expiry="72h",
    disable=False)
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";

const pki = new vault.Mount("pki", {
    path: `%s`,
    type: "pki",
    defaultLeaseTtlSeconds: 3600,
    maxLeaseTtlSeconds: 86400,
});
const crlConfig = new vault.pkiSecret.SecretBackendCrlConfig("crlConfig", {
    backend: pki.path,
    expiry: "72h",
    disable: false,
});

Create a SecretBackendCrlConfig Resource

new SecretBackendCrlConfig(name: string, args: SecretBackendCrlConfigArgs, opts?: CustomResourceOptions);
@overload
def SecretBackendCrlConfig(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           backend: Optional[str] = None,
                           disable: Optional[bool] = None,
                           expiry: Optional[str] = None)
@overload
def SecretBackendCrlConfig(resource_name: str,
                           args: SecretBackendCrlConfigArgs,
                           opts: Optional[ResourceOptions] = None)
func NewSecretBackendCrlConfig(ctx *Context, name string, args SecretBackendCrlConfigArgs, opts ...ResourceOption) (*SecretBackendCrlConfig, error)
public SecretBackendCrlConfig(string name, SecretBackendCrlConfigArgs args, CustomResourceOptions? opts = null)
name string
The unique name of the resource.
args SecretBackendCrlConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args SecretBackendCrlConfigArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args SecretBackendCrlConfigArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args SecretBackendCrlConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.

SecretBackendCrlConfig Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The SecretBackendCrlConfig resource accepts the following input properties:

Backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
Disable bool
Disables or enables CRL building.
Expiry string
Specifies the time until expiration.
Backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
Disable bool
Disables or enables CRL building.
Expiry string
Specifies the time until expiration.
backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
disable boolean
Disables or enables CRL building.
expiry string
Specifies the time until expiration.
backend str
The path the PKI secret backend is mounted at, with no leading or trailing /s.
disable bool
Disables or enables CRL building.
expiry str
Specifies the time until expiration.

Outputs

All input properties are implicitly available as output properties. Additionally, the SecretBackendCrlConfig resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.

Look up an Existing SecretBackendCrlConfig Resource

Get an existing SecretBackendCrlConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: SecretBackendCrlConfigState, opts?: CustomResourceOptions): SecretBackendCrlConfig
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        backend: Optional[str] = None,
        disable: Optional[bool] = None,
        expiry: Optional[str] = None) -> SecretBackendCrlConfig
func GetSecretBackendCrlConfig(ctx *Context, name string, id IDInput, state *SecretBackendCrlConfigState, opts ...ResourceOption) (*SecretBackendCrlConfig, error)
public static SecretBackendCrlConfig Get(string name, Input<string> id, SecretBackendCrlConfigState? state, CustomResourceOptions? opts = null)
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.

The following state arguments are supported:

Backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
Disable bool
Disables or enables CRL building.
Expiry string
Specifies the time until expiration.
Backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
Disable bool
Disables or enables CRL building.
Expiry string
Specifies the time until expiration.
backend string
The path the PKI secret backend is mounted at, with no leading or trailing /s.
disable boolean
Disables or enables CRL building.
expiry string
Specifies the time until expiration.
backend str
The path the PKI secret backend is mounted at, with no leading or trailing /s.
disable bool
Disables or enables CRL building.
expiry str
Specifies the time until expiration.

Package Details

Repository
https://github.com/pulumi/pulumi-vault
License
Apache-2.0
Notes
This Pulumi package is based on the vault Terraform Provider.