pulumi-vault 7.0.0a1750489873__py3-none-any.whl → 7.1.0a1752118888__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +17 -0
- pulumi_vault/database/_inputs.py +48 -0
- pulumi_vault/database/outputs.py +30 -0
- pulumi_vault/database/secret_backend_connection.py +10 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +94 -6
- pulumi_vault/pkisecret/backend_config_scep.py +692 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +252 -0
- pulumi_vault/pkisecret/outputs.py +112 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +61 -14
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_rate_limit.py +153 -3
- pulumi_vault/scep_auth_backend_role.py +855 -0
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_cmac.py +257 -0
- pulumi_vault/transit/get_verify.py +16 -1
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/METADATA +1 -1
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/RECORD +20 -16
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.0.0a1750489873.dist-info → pulumi_vault-7.1.0a1752118888.dist-info}/top_level.txt +0 -0
pulumi_vault/__init__.py
CHANGED
@@ -35,6 +35,7 @@ from .quota_rate_limit import *
|
|
35
35
|
from .raft_autopilot import *
|
36
36
|
from .raft_snapshot_agent_config import *
|
37
37
|
from .rgp_policy import *
|
38
|
+
from .scep_auth_backend_role import *
|
38
39
|
from .token import *
|
39
40
|
from ._inputs import *
|
40
41
|
from . import outputs
|
@@ -797,6 +798,14 @@ _utilities.register(
|
|
797
798
|
"vault:index/rgpPolicy:RgpPolicy": "RgpPolicy"
|
798
799
|
}
|
799
800
|
},
|
801
|
+
{
|
802
|
+
"pkg": "vault",
|
803
|
+
"mod": "index/scepAuthBackendRole",
|
804
|
+
"fqn": "pulumi_vault",
|
805
|
+
"classes": {
|
806
|
+
"vault:index/scepAuthBackendRole:ScepAuthBackendRole": "ScepAuthBackendRole"
|
807
|
+
}
|
808
|
+
},
|
800
809
|
{
|
801
810
|
"pkg": "vault",
|
802
811
|
"mod": "index/token",
|
@@ -1053,6 +1062,14 @@ _utilities.register(
|
|
1053
1062
|
"vault:pkiSecret/backendConfigEst:BackendConfigEst": "BackendConfigEst"
|
1054
1063
|
}
|
1055
1064
|
},
|
1065
|
+
{
|
1066
|
+
"pkg": "vault",
|
1067
|
+
"mod": "pkiSecret/backendConfigScep",
|
1068
|
+
"fqn": "pulumi_vault.pkisecret",
|
1069
|
+
"classes": {
|
1070
|
+
"vault:pkiSecret/backendConfigScep:BackendConfigScep": "BackendConfigScep"
|
1071
|
+
}
|
1072
|
+
},
|
1056
1073
|
{
|
1057
1074
|
"pkg": "vault",
|
1058
1075
|
"mod": "pkiSecret/secretBackendCert",
|
pulumi_vault/database/_inputs.py
CHANGED
@@ -3546,6 +3546,10 @@ if not MYPY:
|
|
3546
3546
|
"""
|
3547
3547
|
Version counter for root credential password write-only field
|
3548
3548
|
"""
|
3549
|
+
private_key_wo_version: NotRequired[pulumi.Input[builtins.int]]
|
3550
|
+
"""
|
3551
|
+
Version counter for the private key key-pair credentials write-only field
|
3552
|
+
"""
|
3549
3553
|
username: NotRequired[pulumi.Input[builtins.str]]
|
3550
3554
|
"""
|
3551
3555
|
The root credential username used in the connection URL
|
@@ -3566,6 +3570,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3566
3570
|
max_open_connections: Optional[pulumi.Input[builtins.int]] = None,
|
3567
3571
|
password: Optional[pulumi.Input[builtins.str]] = None,
|
3568
3572
|
password_wo_version: Optional[pulumi.Input[builtins.int]] = None,
|
3573
|
+
private_key_wo_version: Optional[pulumi.Input[builtins.int]] = None,
|
3569
3574
|
username: Optional[pulumi.Input[builtins.str]] = None,
|
3570
3575
|
username_template: Optional[pulumi.Input[builtins.str]] = None):
|
3571
3576
|
"""
|
@@ -3575,6 +3580,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3575
3580
|
:param pulumi.Input[builtins.int] max_open_connections: Maximum number of open connections to the database.
|
3576
3581
|
:param pulumi.Input[builtins.str] password: The root credential password used in the connection URL
|
3577
3582
|
:param pulumi.Input[builtins.int] password_wo_version: Version counter for root credential password write-only field
|
3583
|
+
:param pulumi.Input[builtins.int] private_key_wo_version: Version counter for the private key key-pair credentials write-only field
|
3578
3584
|
:param pulumi.Input[builtins.str] username: The root credential username used in the connection URL
|
3579
3585
|
:param pulumi.Input[builtins.str] username_template: Username generation template.
|
3580
3586
|
"""
|
@@ -3586,10 +3592,15 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3586
3592
|
pulumi.set(__self__, "max_idle_connections", max_idle_connections)
|
3587
3593
|
if max_open_connections is not None:
|
3588
3594
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
3595
|
+
if password is not None:
|
3596
|
+
warnings.warn("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""", DeprecationWarning)
|
3597
|
+
pulumi.log.warn("""password is deprecated: Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
3589
3598
|
if password is not None:
|
3590
3599
|
pulumi.set(__self__, "password", password)
|
3591
3600
|
if password_wo_version is not None:
|
3592
3601
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
3602
|
+
if private_key_wo_version is not None:
|
3603
|
+
pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
|
3593
3604
|
if username is not None:
|
3594
3605
|
pulumi.set(__self__, "username", username)
|
3595
3606
|
if username_template is not None:
|
@@ -3645,6 +3656,7 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3645
3656
|
|
3646
3657
|
@property
|
3647
3658
|
@pulumi.getter
|
3659
|
+
@_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
3648
3660
|
def password(self) -> Optional[pulumi.Input[builtins.str]]:
|
3649
3661
|
"""
|
3650
3662
|
The root credential password used in the connection URL
|
@@ -3667,6 +3679,18 @@ class SecretBackendConnectionSnowflakeArgs:
|
|
3667
3679
|
def password_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
|
3668
3680
|
pulumi.set(self, "password_wo_version", value)
|
3669
3681
|
|
3682
|
+
@property
|
3683
|
+
@pulumi.getter(name="privateKeyWoVersion")
|
3684
|
+
def private_key_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
|
3685
|
+
"""
|
3686
|
+
Version counter for the private key key-pair credentials write-only field
|
3687
|
+
"""
|
3688
|
+
return pulumi.get(self, "private_key_wo_version")
|
3689
|
+
|
3690
|
+
@private_key_wo_version.setter
|
3691
|
+
def private_key_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
|
3692
|
+
pulumi.set(self, "private_key_wo_version", value)
|
3693
|
+
|
3670
3694
|
@property
|
3671
3695
|
@pulumi.getter
|
3672
3696
|
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
@@ -10960,6 +10984,10 @@ if not MYPY:
|
|
10960
10984
|
"""
|
10961
10985
|
Specifies the name of the plugin to use.
|
10962
10986
|
"""
|
10987
|
+
private_key_wo_version: NotRequired[pulumi.Input[builtins.int]]
|
10988
|
+
"""
|
10989
|
+
Version counter for the private key key-pair credentials write-only field
|
10990
|
+
"""
|
10963
10991
|
root_rotation_statements: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
10964
10992
|
"""
|
10965
10993
|
A list of database statements to be executed to rotate the root user's credentials.
|
@@ -11010,6 +11038,7 @@ class SecretsMountSnowflakeArgs:
|
|
11010
11038
|
password: Optional[pulumi.Input[builtins.str]] = None,
|
11011
11039
|
password_wo_version: Optional[pulumi.Input[builtins.int]] = None,
|
11012
11040
|
plugin_name: Optional[pulumi.Input[builtins.str]] = None,
|
11041
|
+
private_key_wo_version: Optional[pulumi.Input[builtins.int]] = None,
|
11013
11042
|
root_rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
11014
11043
|
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
11015
11044
|
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
@@ -11032,6 +11061,7 @@ class SecretsMountSnowflakeArgs:
|
|
11032
11061
|
:param pulumi.Input[builtins.str] password: The root credential password used in the connection URL
|
11033
11062
|
:param pulumi.Input[builtins.int] password_wo_version: Version counter for root credential password write-only field
|
11034
11063
|
:param pulumi.Input[builtins.str] plugin_name: Specifies the name of the plugin to use.
|
11064
|
+
:param pulumi.Input[builtins.int] private_key_wo_version: Version counter for the private key key-pair credentials write-only field
|
11035
11065
|
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
11036
11066
|
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
11037
11067
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -11060,12 +11090,17 @@ class SecretsMountSnowflakeArgs:
|
|
11060
11090
|
pulumi.set(__self__, "max_idle_connections", max_idle_connections)
|
11061
11091
|
if max_open_connections is not None:
|
11062
11092
|
pulumi.set(__self__, "max_open_connections", max_open_connections)
|
11093
|
+
if password is not None:
|
11094
|
+
warnings.warn("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""", DeprecationWarning)
|
11095
|
+
pulumi.log.warn("""password is deprecated: Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
11063
11096
|
if password is not None:
|
11064
11097
|
pulumi.set(__self__, "password", password)
|
11065
11098
|
if password_wo_version is not None:
|
11066
11099
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
11067
11100
|
if plugin_name is not None:
|
11068
11101
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
11102
|
+
if private_key_wo_version is not None:
|
11103
|
+
pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
|
11069
11104
|
if root_rotation_statements is not None:
|
11070
11105
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
11071
11106
|
if rotation_period is not None:
|
@@ -11182,6 +11217,7 @@ class SecretsMountSnowflakeArgs:
|
|
11182
11217
|
|
11183
11218
|
@property
|
11184
11219
|
@pulumi.getter
|
11220
|
+
@_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
11185
11221
|
def password(self) -> Optional[pulumi.Input[builtins.str]]:
|
11186
11222
|
"""
|
11187
11223
|
The root credential password used in the connection URL
|
@@ -11216,6 +11252,18 @@ class SecretsMountSnowflakeArgs:
|
|
11216
11252
|
def plugin_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
11217
11253
|
pulumi.set(self, "plugin_name", value)
|
11218
11254
|
|
11255
|
+
@property
|
11256
|
+
@pulumi.getter(name="privateKeyWoVersion")
|
11257
|
+
def private_key_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
|
11258
|
+
"""
|
11259
|
+
Version counter for the private key key-pair credentials write-only field
|
11260
|
+
"""
|
11261
|
+
return pulumi.get(self, "private_key_wo_version")
|
11262
|
+
|
11263
|
+
@private_key_wo_version.setter
|
11264
|
+
def private_key_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
|
11265
|
+
pulumi.set(self, "private_key_wo_version", value)
|
11266
|
+
|
11219
11267
|
@property
|
11220
11268
|
@pulumi.getter(name="rootRotationStatements")
|
11221
11269
|
def root_rotation_statements(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
pulumi_vault/database/outputs.py
CHANGED
@@ -2586,6 +2586,8 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2586
2586
|
suggest = "max_open_connections"
|
2587
2587
|
elif key == "passwordWoVersion":
|
2588
2588
|
suggest = "password_wo_version"
|
2589
|
+
elif key == "privateKeyWoVersion":
|
2590
|
+
suggest = "private_key_wo_version"
|
2589
2591
|
elif key == "usernameTemplate":
|
2590
2592
|
suggest = "username_template"
|
2591
2593
|
|
@@ -2607,6 +2609,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2607
2609
|
max_open_connections: Optional[builtins.int] = None,
|
2608
2610
|
password: Optional[builtins.str] = None,
|
2609
2611
|
password_wo_version: Optional[builtins.int] = None,
|
2612
|
+
private_key_wo_version: Optional[builtins.int] = None,
|
2610
2613
|
username: Optional[builtins.str] = None,
|
2611
2614
|
username_template: Optional[builtins.str] = None):
|
2612
2615
|
"""
|
@@ -2616,6 +2619,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2616
2619
|
:param builtins.int max_open_connections: Maximum number of open connections to the database.
|
2617
2620
|
:param builtins.str password: The root credential password used in the connection URL
|
2618
2621
|
:param builtins.int password_wo_version: Version counter for root credential password write-only field
|
2622
|
+
:param builtins.int private_key_wo_version: Version counter for the private key key-pair credentials write-only field
|
2619
2623
|
:param builtins.str username: The root credential username used in the connection URL
|
2620
2624
|
:param builtins.str username_template: Username generation template.
|
2621
2625
|
"""
|
@@ -2631,6 +2635,8 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2631
2635
|
pulumi.set(__self__, "password", password)
|
2632
2636
|
if password_wo_version is not None:
|
2633
2637
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
2638
|
+
if private_key_wo_version is not None:
|
2639
|
+
pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
|
2634
2640
|
if username is not None:
|
2635
2641
|
pulumi.set(__self__, "username", username)
|
2636
2642
|
if username_template is not None:
|
@@ -2670,6 +2676,7 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2670
2676
|
|
2671
2677
|
@property
|
2672
2678
|
@pulumi.getter
|
2679
|
+
@_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
2673
2680
|
def password(self) -> Optional[builtins.str]:
|
2674
2681
|
"""
|
2675
2682
|
The root credential password used in the connection URL
|
@@ -2684,6 +2691,14 @@ class SecretBackendConnectionSnowflake(dict):
|
|
2684
2691
|
"""
|
2685
2692
|
return pulumi.get(self, "password_wo_version")
|
2686
2693
|
|
2694
|
+
@property
|
2695
|
+
@pulumi.getter(name="privateKeyWoVersion")
|
2696
|
+
def private_key_wo_version(self) -> Optional[builtins.int]:
|
2697
|
+
"""
|
2698
|
+
Version counter for the private key key-pair credentials write-only field
|
2699
|
+
"""
|
2700
|
+
return pulumi.get(self, "private_key_wo_version")
|
2701
|
+
|
2687
2702
|
@property
|
2688
2703
|
@pulumi.getter
|
2689
2704
|
def username(self) -> Optional[builtins.str]:
|
@@ -7821,6 +7836,8 @@ class SecretsMountSnowflake(dict):
|
|
7821
7836
|
suggest = "password_wo_version"
|
7822
7837
|
elif key == "pluginName":
|
7823
7838
|
suggest = "plugin_name"
|
7839
|
+
elif key == "privateKeyWoVersion":
|
7840
|
+
suggest = "private_key_wo_version"
|
7824
7841
|
elif key == "rootRotationStatements":
|
7825
7842
|
suggest = "root_rotation_statements"
|
7826
7843
|
elif key == "rotationPeriod":
|
@@ -7857,6 +7874,7 @@ class SecretsMountSnowflake(dict):
|
|
7857
7874
|
password: Optional[builtins.str] = None,
|
7858
7875
|
password_wo_version: Optional[builtins.int] = None,
|
7859
7876
|
plugin_name: Optional[builtins.str] = None,
|
7877
|
+
private_key_wo_version: Optional[builtins.int] = None,
|
7860
7878
|
root_rotation_statements: Optional[Sequence[builtins.str]] = None,
|
7861
7879
|
rotation_period: Optional[builtins.int] = None,
|
7862
7880
|
rotation_schedule: Optional[builtins.str] = None,
|
@@ -7879,6 +7897,7 @@ class SecretsMountSnowflake(dict):
|
|
7879
7897
|
:param builtins.str password: The root credential password used in the connection URL
|
7880
7898
|
:param builtins.int password_wo_version: Version counter for root credential password write-only field
|
7881
7899
|
:param builtins.str plugin_name: Specifies the name of the plugin to use.
|
7900
|
+
:param builtins.int private_key_wo_version: Version counter for the private key key-pair credentials write-only field
|
7882
7901
|
:param Sequence[builtins.str] root_rotation_statements: A list of database statements to be executed to rotate the root user's credentials.
|
7883
7902
|
:param builtins.int rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
7884
7903
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -7913,6 +7932,8 @@ class SecretsMountSnowflake(dict):
|
|
7913
7932
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
7914
7933
|
if plugin_name is not None:
|
7915
7934
|
pulumi.set(__self__, "plugin_name", plugin_name)
|
7935
|
+
if private_key_wo_version is not None:
|
7936
|
+
pulumi.set(__self__, "private_key_wo_version", private_key_wo_version)
|
7916
7937
|
if root_rotation_statements is not None:
|
7917
7938
|
pulumi.set(__self__, "root_rotation_statements", root_rotation_statements)
|
7918
7939
|
if rotation_period is not None:
|
@@ -7997,6 +8018,7 @@ class SecretsMountSnowflake(dict):
|
|
7997
8018
|
|
7998
8019
|
@property
|
7999
8020
|
@pulumi.getter
|
8021
|
+
@_utilities.deprecated("""Snowflake is ending support for single-factor password authentication by November 2025. Refer to the documentation for more information on migrating to key-pair authentication.""")
|
8000
8022
|
def password(self) -> Optional[builtins.str]:
|
8001
8023
|
"""
|
8002
8024
|
The root credential password used in the connection URL
|
@@ -8019,6 +8041,14 @@ class SecretsMountSnowflake(dict):
|
|
8019
8041
|
"""
|
8020
8042
|
return pulumi.get(self, "plugin_name")
|
8021
8043
|
|
8044
|
+
@property
|
8045
|
+
@pulumi.getter(name="privateKeyWoVersion")
|
8046
|
+
def private_key_wo_version(self) -> Optional[builtins.int]:
|
8047
|
+
"""
|
8048
|
+
Version counter for the private key key-pair credentials write-only field
|
8049
|
+
"""
|
8050
|
+
return pulumi.get(self, "private_key_wo_version")
|
8051
|
+
|
8022
8052
|
@property
|
8023
8053
|
@pulumi.getter(name="rootRotationStatements")
|
8024
8054
|
def root_rotation_statements(self) -> Optional[Sequence[builtins.str]]:
|
@@ -1106,6 +1106,11 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1106
1106
|
* `password_wo` - (Optional) The password for the user. Can be updated.
|
1107
1107
|
**Note**: This property is write-only and will not be read from the API.
|
1108
1108
|
|
1109
|
+
The following write-only attribute is supported only for Snowflake DB:
|
1110
|
+
|
1111
|
+
* `private_key_wo` - (Optional) The private key associated with the Snowflake user.
|
1112
|
+
**Note**: This property is write-only and will not be read from the API.
|
1113
|
+
|
1109
1114
|
## Import
|
1110
1115
|
|
1111
1116
|
Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
@@ -1195,6 +1200,11 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
1195
1200
|
* `password_wo` - (Optional) The password for the user. Can be updated.
|
1196
1201
|
**Note**: This property is write-only and will not be read from the API.
|
1197
1202
|
|
1203
|
+
The following write-only attribute is supported only for Snowflake DB:
|
1204
|
+
|
1205
|
+
* `private_key_wo` - (Optional) The private key associated with the Snowflake user.
|
1206
|
+
**Note**: This property is write-only and will not be read from the API.
|
1207
|
+
|
1198
1208
|
## Import
|
1199
1209
|
|
1200
1210
|
Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
@@ -12,9 +12,11 @@ from .backend_config_auto_tidy import *
|
|
12
12
|
from .backend_config_cluster import *
|
13
13
|
from .backend_config_cmpv2 import *
|
14
14
|
from .backend_config_est import *
|
15
|
+
from .backend_config_scep import *
|
15
16
|
from .get_backend_cert_metadata import *
|
16
17
|
from .get_backend_config_cmpv2 import *
|
17
18
|
from .get_backend_config_est import *
|
19
|
+
from .get_backend_config_scep import *
|
18
20
|
from .get_backend_issuer import *
|
19
21
|
from .get_backend_issuers import *
|
20
22
|
from .get_backend_key import *
|
@@ -20,6 +20,10 @@ __all__ = [
|
|
20
20
|
'BackendConfigCmpv2AuthenticatorsArgsDict',
|
21
21
|
'BackendConfigEstAuthenticatorsArgs',
|
22
22
|
'BackendConfigEstAuthenticatorsArgsDict',
|
23
|
+
'BackendConfigScepAuthenticatorsArgs',
|
24
|
+
'BackendConfigScepAuthenticatorsArgsDict',
|
25
|
+
'BackendConfigScepExternalValidationArgs',
|
26
|
+
'BackendConfigScepExternalValidationArgsDict',
|
23
27
|
'SecretBackendRolePolicyIdentifierArgs',
|
24
28
|
'SecretBackendRolePolicyIdentifierArgsDict',
|
25
29
|
]
|
@@ -62,11 +66,11 @@ if not MYPY:
|
|
62
66
|
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
63
67
|
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
64
68
|
"""
|
65
|
-
|
69
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
66
70
|
"""
|
67
71
|
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
68
72
|
"""
|
69
|
-
|
73
|
+
The accessor (required) property for user pass auth backends.
|
70
74
|
"""
|
71
75
|
elif False:
|
72
76
|
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -77,8 +81,8 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
77
81
|
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
78
82
|
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
79
83
|
"""
|
80
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert:
|
81
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass:
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
85
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
|
82
86
|
"""
|
83
87
|
if cert is not None:
|
84
88
|
pulumi.set(__self__, "cert", cert)
|
@@ -89,7 +93,7 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
89
93
|
@pulumi.getter
|
90
94
|
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
91
95
|
"""
|
92
|
-
|
96
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
93
97
|
"""
|
94
98
|
return pulumi.get(self, "cert")
|
95
99
|
|
@@ -101,7 +105,7 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
101
105
|
@pulumi.getter
|
102
106
|
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
103
107
|
"""
|
104
|
-
|
108
|
+
The accessor (required) property for user pass auth backends.
|
105
109
|
"""
|
106
110
|
return pulumi.get(self, "userpass")
|
107
111
|
|
@@ -110,6 +114,90 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
110
114
|
pulumi.set(self, "userpass", value)
|
111
115
|
|
112
116
|
|
117
|
+
if not MYPY:
|
118
|
+
class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
|
119
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
120
|
+
"""
|
121
|
+
The accessor and cert_role properties for cert auth backends
|
122
|
+
"""
|
123
|
+
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
124
|
+
"""
|
125
|
+
The accessor property for SCEP auth backends
|
126
|
+
"""
|
127
|
+
elif False:
|
128
|
+
BackendConfigScepAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
129
|
+
|
130
|
+
@pulumi.input_type
|
131
|
+
class BackendConfigScepAuthenticatorsArgs:
|
132
|
+
def __init__(__self__, *,
|
133
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
134
|
+
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
135
|
+
"""
|
136
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
|
137
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] scep: The accessor property for SCEP auth backends
|
138
|
+
"""
|
139
|
+
if cert is not None:
|
140
|
+
pulumi.set(__self__, "cert", cert)
|
141
|
+
if scep is not None:
|
142
|
+
pulumi.set(__self__, "scep", scep)
|
143
|
+
|
144
|
+
@property
|
145
|
+
@pulumi.getter
|
146
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
147
|
+
"""
|
148
|
+
The accessor and cert_role properties for cert auth backends
|
149
|
+
"""
|
150
|
+
return pulumi.get(self, "cert")
|
151
|
+
|
152
|
+
@cert.setter
|
153
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
154
|
+
pulumi.set(self, "cert", value)
|
155
|
+
|
156
|
+
@property
|
157
|
+
@pulumi.getter
|
158
|
+
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
159
|
+
"""
|
160
|
+
The accessor property for SCEP auth backends
|
161
|
+
"""
|
162
|
+
return pulumi.get(self, "scep")
|
163
|
+
|
164
|
+
@scep.setter
|
165
|
+
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
166
|
+
pulumi.set(self, "scep", value)
|
167
|
+
|
168
|
+
|
169
|
+
if not MYPY:
|
170
|
+
class BackendConfigScepExternalValidationArgsDict(TypedDict):
|
171
|
+
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
172
|
+
"""
|
173
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
174
|
+
"""
|
175
|
+
elif False:
|
176
|
+
BackendConfigScepExternalValidationArgsDict: TypeAlias = Mapping[str, Any]
|
177
|
+
|
178
|
+
@pulumi.input_type
|
179
|
+
class BackendConfigScepExternalValidationArgs:
|
180
|
+
def __init__(__self__, *,
|
181
|
+
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
182
|
+
"""
|
183
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
184
|
+
"""
|
185
|
+
if intune is not None:
|
186
|
+
pulumi.set(__self__, "intune", intune)
|
187
|
+
|
188
|
+
@property
|
189
|
+
@pulumi.getter
|
190
|
+
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
191
|
+
"""
|
192
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
193
|
+
"""
|
194
|
+
return pulumi.get(self, "intune")
|
195
|
+
|
196
|
+
@intune.setter
|
197
|
+
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
198
|
+
pulumi.set(self, "intune", value)
|
199
|
+
|
200
|
+
|
113
201
|
if not MYPY:
|
114
202
|
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
115
203
|
oid: pulumi.Input[builtins.str]
|