pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,27 +22,27 @@ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class BackendConfigCmpv2Args:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
backend: pulumi.Input[str],
|
25
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
+
backend: pulumi.Input[builtins.str],
|
26
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
27
|
authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
|
27
|
-
default_path_policy: Optional[pulumi.Input[str]] = None,
|
28
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
29
|
-
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
30
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
31
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
28
|
+
default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
30
|
+
enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
32
33
|
"""
|
33
34
|
The set of arguments for constructing a BackendConfigCmpv2 resource.
|
34
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
35
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
35
36
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
37
38
|
:param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
38
|
-
:param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
39
|
+
:param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
40
41
|
|
41
42
|
<a id="nestedatt--authenticators"></a>
|
42
|
-
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
43
|
-
:param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
|
44
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
43
|
+
:param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
44
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
45
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
45
46
|
The value should not contain leading or trailing forward slashes.
|
46
47
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
48
|
*Available only for Vault Enterprise*.
|
@@ -64,7 +65,7 @@ class BackendConfigCmpv2Args:
|
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter
|
67
|
-
def backend(self) -> pulumi.Input[str]:
|
68
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
68
69
|
"""
|
69
70
|
The path to the PKI secret backend to
|
70
71
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
@@ -72,19 +73,19 @@ class BackendConfigCmpv2Args:
|
|
72
73
|
return pulumi.get(self, "backend")
|
73
74
|
|
74
75
|
@backend.setter
|
75
|
-
def backend(self, value: pulumi.Input[str]):
|
76
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
76
77
|
pulumi.set(self, "backend", value)
|
77
78
|
|
78
79
|
@property
|
79
80
|
@pulumi.getter(name="auditFields")
|
80
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
81
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
81
82
|
"""
|
82
83
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
83
84
|
"""
|
84
85
|
return pulumi.get(self, "audit_fields")
|
85
86
|
|
86
87
|
@audit_fields.setter
|
87
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
88
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
88
89
|
pulumi.set(self, "audit_fields", value)
|
89
90
|
|
90
91
|
@property
|
@@ -101,19 +102,19 @@ class BackendConfigCmpv2Args:
|
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter(name="defaultPathPolicy")
|
104
|
-
def default_path_policy(self) -> Optional[pulumi.Input[str]]:
|
105
|
+
def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
105
106
|
"""
|
106
107
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
107
108
|
"""
|
108
109
|
return pulumi.get(self, "default_path_policy")
|
109
110
|
|
110
111
|
@default_path_policy.setter
|
111
|
-
def default_path_policy(self, value: Optional[pulumi.Input[str]]):
|
112
|
+
def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
112
113
|
pulumi.set(self, "default_path_policy", value)
|
113
114
|
|
114
115
|
@property
|
115
116
|
@pulumi.getter(name="disabledValidations")
|
116
|
-
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
117
|
+
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
117
118
|
"""
|
118
119
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
119
120
|
|
@@ -122,36 +123,36 @@ class BackendConfigCmpv2Args:
|
|
122
123
|
return pulumi.get(self, "disabled_validations")
|
123
124
|
|
124
125
|
@disabled_validations.setter
|
125
|
-
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
126
|
+
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
126
127
|
pulumi.set(self, "disabled_validations", value)
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter(name="enableSentinelParsing")
|
130
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
|
131
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
|
131
132
|
"""
|
132
133
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
133
134
|
"""
|
134
135
|
return pulumi.get(self, "enable_sentinel_parsing")
|
135
136
|
|
136
137
|
@enable_sentinel_parsing.setter
|
137
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
|
138
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
|
138
139
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter
|
142
|
-
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
143
|
+
def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
|
143
144
|
"""
|
144
145
|
Specifies whether CMPv2 is enabled.
|
145
146
|
"""
|
146
147
|
return pulumi.get(self, "enabled")
|
147
148
|
|
148
149
|
@enabled.setter
|
149
|
-
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
150
|
+
def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
|
150
151
|
pulumi.set(self, "enabled", value)
|
151
152
|
|
152
153
|
@property
|
153
154
|
@pulumi.getter
|
154
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
155
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
155
156
|
"""
|
156
157
|
The namespace of the target resource.
|
157
158
|
The value should not contain leading or trailing forward slashes.
|
@@ -161,36 +162,36 @@ class BackendConfigCmpv2Args:
|
|
161
162
|
return pulumi.get(self, "namespace")
|
162
163
|
|
163
164
|
@namespace.setter
|
164
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
165
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
165
166
|
pulumi.set(self, "namespace", value)
|
166
167
|
|
167
168
|
|
168
169
|
@pulumi.input_type
|
169
170
|
class _BackendConfigCmpv2State:
|
170
171
|
def __init__(__self__, *,
|
171
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
172
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
172
173
|
authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
|
173
|
-
backend: Optional[pulumi.Input[str]] = None,
|
174
|
-
default_path_policy: Optional[pulumi.Input[str]] = None,
|
175
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
176
|
-
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
177
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
178
|
-
last_updated: Optional[pulumi.Input[str]] = None,
|
179
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
174
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
175
|
+
default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
|
176
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
177
|
+
enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
|
178
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
179
|
+
last_updated: Optional[pulumi.Input[builtins.str]] = None,
|
180
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
180
181
|
"""
|
181
182
|
Input properties used for looking up and filtering BackendConfigCmpv2 resources.
|
182
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
183
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
183
184
|
:param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
184
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
185
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
185
186
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
186
|
-
:param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
187
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
187
|
+
:param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
188
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
188
189
|
|
189
190
|
<a id="nestedatt--authenticators"></a>
|
190
|
-
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
191
|
-
:param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
|
192
|
-
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
193
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
191
|
+
:param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
192
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
193
|
+
:param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
194
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
194
195
|
The value should not contain leading or trailing forward slashes.
|
195
196
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
196
197
|
*Available only for Vault Enterprise*.
|
@@ -216,14 +217,14 @@ class _BackendConfigCmpv2State:
|
|
216
217
|
|
217
218
|
@property
|
218
219
|
@pulumi.getter(name="auditFields")
|
219
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
220
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
220
221
|
"""
|
221
222
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
222
223
|
"""
|
223
224
|
return pulumi.get(self, "audit_fields")
|
224
225
|
|
225
226
|
@audit_fields.setter
|
226
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
227
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
227
228
|
pulumi.set(self, "audit_fields", value)
|
228
229
|
|
229
230
|
@property
|
@@ -240,7 +241,7 @@ class _BackendConfigCmpv2State:
|
|
240
241
|
|
241
242
|
@property
|
242
243
|
@pulumi.getter
|
243
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
244
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
244
245
|
"""
|
245
246
|
The path to the PKI secret backend to
|
246
247
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
@@ -248,24 +249,24 @@ class _BackendConfigCmpv2State:
|
|
248
249
|
return pulumi.get(self, "backend")
|
249
250
|
|
250
251
|
@backend.setter
|
251
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
252
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
252
253
|
pulumi.set(self, "backend", value)
|
253
254
|
|
254
255
|
@property
|
255
256
|
@pulumi.getter(name="defaultPathPolicy")
|
256
|
-
def default_path_policy(self) -> Optional[pulumi.Input[str]]:
|
257
|
+
def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
|
257
258
|
"""
|
258
259
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
259
260
|
"""
|
260
261
|
return pulumi.get(self, "default_path_policy")
|
261
262
|
|
262
263
|
@default_path_policy.setter
|
263
|
-
def default_path_policy(self, value: Optional[pulumi.Input[str]]):
|
264
|
+
def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
|
264
265
|
pulumi.set(self, "default_path_policy", value)
|
265
266
|
|
266
267
|
@property
|
267
268
|
@pulumi.getter(name="disabledValidations")
|
268
|
-
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
269
|
+
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
269
270
|
"""
|
270
271
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
271
272
|
|
@@ -274,48 +275,48 @@ class _BackendConfigCmpv2State:
|
|
274
275
|
return pulumi.get(self, "disabled_validations")
|
275
276
|
|
276
277
|
@disabled_validations.setter
|
277
|
-
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
278
|
+
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
278
279
|
pulumi.set(self, "disabled_validations", value)
|
279
280
|
|
280
281
|
@property
|
281
282
|
@pulumi.getter(name="enableSentinelParsing")
|
282
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
|
283
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
|
283
284
|
"""
|
284
285
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
285
286
|
"""
|
286
287
|
return pulumi.get(self, "enable_sentinel_parsing")
|
287
288
|
|
288
289
|
@enable_sentinel_parsing.setter
|
289
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
|
290
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
|
290
291
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
291
292
|
|
292
293
|
@property
|
293
294
|
@pulumi.getter
|
294
|
-
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
295
|
+
def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
|
295
296
|
"""
|
296
297
|
Specifies whether CMPv2 is enabled.
|
297
298
|
"""
|
298
299
|
return pulumi.get(self, "enabled")
|
299
300
|
|
300
301
|
@enabled.setter
|
301
|
-
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
302
|
+
def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
|
302
303
|
pulumi.set(self, "enabled", value)
|
303
304
|
|
304
305
|
@property
|
305
306
|
@pulumi.getter(name="lastUpdated")
|
306
|
-
def last_updated(self) -> Optional[pulumi.Input[str]]:
|
307
|
+
def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
|
307
308
|
"""
|
308
309
|
A read-only timestamp representing the last time the configuration was updated.
|
309
310
|
"""
|
310
311
|
return pulumi.get(self, "last_updated")
|
311
312
|
|
312
313
|
@last_updated.setter
|
313
|
-
def last_updated(self, value: Optional[pulumi.Input[str]]):
|
314
|
+
def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
|
314
315
|
pulumi.set(self, "last_updated", value)
|
315
316
|
|
316
317
|
@property
|
317
318
|
@pulumi.getter
|
318
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
319
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
319
320
|
"""
|
320
321
|
The namespace of the target resource.
|
321
322
|
The value should not contain leading or trailing forward slashes.
|
@@ -325,7 +326,7 @@ class _BackendConfigCmpv2State:
|
|
325
326
|
return pulumi.get(self, "namespace")
|
326
327
|
|
327
328
|
@namespace.setter
|
328
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
329
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
329
330
|
pulumi.set(self, "namespace", value)
|
330
331
|
|
331
332
|
|
@@ -334,14 +335,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
334
335
|
def __init__(__self__,
|
335
336
|
resource_name: str,
|
336
337
|
opts: Optional[pulumi.ResourceOptions] = None,
|
337
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
338
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
338
339
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
339
|
-
backend: Optional[pulumi.Input[str]] = None,
|
340
|
-
default_path_policy: Optional[pulumi.Input[str]] = None,
|
341
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
342
|
-
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
343
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
344
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
340
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
341
|
+
default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
|
342
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
343
|
+
enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
|
344
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
345
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
345
346
|
__props__=None):
|
346
347
|
"""
|
347
348
|
Allows setting the CMPv2 configuration on a PKI Secret Backend
|
@@ -358,17 +359,17 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
358
359
|
|
359
360
|
:param str resource_name: The name of the resource.
|
360
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
361
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
362
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
362
363
|
:param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
363
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
364
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
364
365
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
365
|
-
:param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
366
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
366
|
+
:param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
367
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
367
368
|
|
368
369
|
<a id="nestedatt--authenticators"></a>
|
369
|
-
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
370
|
-
:param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
|
371
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
370
|
+
:param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
371
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
372
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
372
373
|
The value should not contain leading or trailing forward slashes.
|
373
374
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
374
375
|
*Available only for Vault Enterprise*.
|
@@ -407,14 +408,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
407
408
|
def _internal_init(__self__,
|
408
409
|
resource_name: str,
|
409
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
410
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
411
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
411
412
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
412
|
-
backend: Optional[pulumi.Input[str]] = None,
|
413
|
-
default_path_policy: Optional[pulumi.Input[str]] = None,
|
414
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
415
|
-
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
416
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
417
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
413
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
414
|
+
default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
|
415
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
416
|
+
enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
|
417
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
418
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
418
419
|
__props__=None):
|
419
420
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
420
421
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -445,15 +446,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
445
446
|
def get(resource_name: str,
|
446
447
|
id: pulumi.Input[str],
|
447
448
|
opts: Optional[pulumi.ResourceOptions] = None,
|
448
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
449
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
449
450
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
450
|
-
backend: Optional[pulumi.Input[str]] = None,
|
451
|
-
default_path_policy: Optional[pulumi.Input[str]] = None,
|
452
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
453
|
-
enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
|
454
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
455
|
-
last_updated: Optional[pulumi.Input[str]] = None,
|
456
|
-
namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigCmpv2':
|
451
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
452
|
+
default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
|
453
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
454
|
+
enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
|
455
|
+
enabled: Optional[pulumi.Input[builtins.bool]] = None,
|
456
|
+
last_updated: Optional[pulumi.Input[builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigCmpv2':
|
457
458
|
"""
|
458
459
|
Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
|
459
460
|
properties used to qualify the lookup.
|
@@ -461,18 +462,18 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
461
462
|
:param str resource_name: The unique name of the resulting resource.
|
462
463
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
463
464
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
464
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
465
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
465
466
|
:param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
466
|
-
:param pulumi.Input[str] backend: The path to the PKI secret backend to
|
467
|
+
:param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
|
467
468
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
468
|
-
:param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
469
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
469
|
+
:param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
470
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
470
471
|
|
471
472
|
<a id="nestedatt--authenticators"></a>
|
472
|
-
:param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
473
|
-
:param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
|
474
|
-
:param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
475
|
-
:param pulumi.Input[str] namespace: The namespace of the target resource.
|
473
|
+
:param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
474
|
+
:param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
475
|
+
:param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
476
|
+
:param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
|
476
477
|
The value should not contain leading or trailing forward slashes.
|
477
478
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
478
479
|
*Available only for Vault Enterprise*.
|
@@ -494,7 +495,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
494
495
|
|
495
496
|
@property
|
496
497
|
@pulumi.getter(name="auditFields")
|
497
|
-
def audit_fields(self) -> pulumi.Output[Sequence[str]]:
|
498
|
+
def audit_fields(self) -> pulumi.Output[Sequence[builtins.str]]:
|
498
499
|
"""
|
499
500
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
500
501
|
"""
|
@@ -510,7 +511,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
510
511
|
|
511
512
|
@property
|
512
513
|
@pulumi.getter
|
513
|
-
def backend(self) -> pulumi.Output[str]:
|
514
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
514
515
|
"""
|
515
516
|
The path to the PKI secret backend to
|
516
517
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
@@ -519,7 +520,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
519
520
|
|
520
521
|
@property
|
521
522
|
@pulumi.getter(name="defaultPathPolicy")
|
522
|
-
def default_path_policy(self) -> pulumi.Output[Optional[str]]:
|
523
|
+
def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
|
523
524
|
"""
|
524
525
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
525
526
|
"""
|
@@ -527,7 +528,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
527
528
|
|
528
529
|
@property
|
529
530
|
@pulumi.getter(name="disabledValidations")
|
530
|
-
def disabled_validations(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
531
|
+
def disabled_validations(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
531
532
|
"""
|
532
533
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
533
534
|
|
@@ -537,7 +538,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
537
538
|
|
538
539
|
@property
|
539
540
|
@pulumi.getter(name="enableSentinelParsing")
|
540
|
-
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[bool]]:
|
541
|
+
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[builtins.bool]]:
|
541
542
|
"""
|
542
543
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
543
544
|
"""
|
@@ -545,7 +546,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
545
546
|
|
546
547
|
@property
|
547
548
|
@pulumi.getter
|
548
|
-
def enabled(self) -> pulumi.Output[Optional[bool]]:
|
549
|
+
def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
|
549
550
|
"""
|
550
551
|
Specifies whether CMPv2 is enabled.
|
551
552
|
"""
|
@@ -553,7 +554,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
553
554
|
|
554
555
|
@property
|
555
556
|
@pulumi.getter(name="lastUpdated")
|
556
|
-
def last_updated(self) -> pulumi.Output[str]:
|
557
|
+
def last_updated(self) -> pulumi.Output[builtins.str]:
|
557
558
|
"""
|
558
559
|
A read-only timestamp representing the last time the configuration was updated.
|
559
560
|
"""
|
@@ -561,7 +562,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
561
562
|
|
562
563
|
@property
|
563
564
|
@pulumi.getter
|
564
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
565
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
565
566
|
"""
|
566
567
|
The namespace of the target resource.
|
567
568
|
The value should not contain leading or trailing forward slashes.
|