pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -32,7 +31,7 @@ MYPY = False
|
|
32
31
|
|
33
32
|
if not MYPY:
|
34
33
|
class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
|
35
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
34
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
36
35
|
"""
|
37
36
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
38
37
|
"""
|
@@ -42,33 +41,33 @@ elif False:
|
|
42
41
|
@pulumi.input_type
|
43
42
|
class BackendConfigCmpv2AuthenticatorsArgs:
|
44
43
|
def __init__(__self__, *,
|
45
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
44
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
46
45
|
"""
|
47
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
48
47
|
"""
|
49
48
|
if cert is not None:
|
50
49
|
pulumi.set(__self__, "cert", cert)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter
|
54
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
53
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
55
54
|
"""
|
56
55
|
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "cert")
|
59
58
|
|
60
59
|
@cert.setter
|
61
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
60
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
62
61
|
pulumi.set(self, "cert", value)
|
63
62
|
|
64
63
|
|
65
64
|
if not MYPY:
|
66
65
|
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
67
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
66
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
68
67
|
"""
|
69
68
|
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
70
69
|
"""
|
71
|
-
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
70
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
72
71
|
"""
|
73
72
|
The accessor (required) property for user pass auth backends.
|
74
73
|
"""
|
@@ -78,49 +77,49 @@ elif False:
|
|
78
77
|
@pulumi.input_type
|
79
78
|
class BackendConfigEstAuthenticatorsArgs:
|
80
79
|
def __init__(__self__, *,
|
81
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
82
|
-
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
80
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
81
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
83
82
|
"""
|
84
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
85
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
83
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
|
86
85
|
"""
|
87
86
|
if cert is not None:
|
88
87
|
pulumi.set(__self__, "cert", cert)
|
89
88
|
if userpass is not None:
|
90
89
|
pulumi.set(__self__, "userpass", userpass)
|
91
90
|
|
92
|
-
@property
|
91
|
+
@_builtins.property
|
93
92
|
@pulumi.getter
|
94
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
93
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
95
94
|
"""
|
96
95
|
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
97
96
|
"""
|
98
97
|
return pulumi.get(self, "cert")
|
99
98
|
|
100
99
|
@cert.setter
|
101
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
100
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
102
101
|
pulumi.set(self, "cert", value)
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter
|
106
|
-
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
105
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
107
106
|
"""
|
108
107
|
The accessor (required) property for user pass auth backends.
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "userpass")
|
111
110
|
|
112
111
|
@userpass.setter
|
113
|
-
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
112
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
114
113
|
pulumi.set(self, "userpass", value)
|
115
114
|
|
116
115
|
|
117
116
|
if not MYPY:
|
118
117
|
class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
|
119
|
-
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
118
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
120
119
|
"""
|
121
120
|
The accessor and cert_role properties for cert auth backends
|
122
121
|
"""
|
123
|
-
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
122
|
+
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
124
123
|
"""
|
125
124
|
The accessor property for SCEP auth backends
|
126
125
|
"""
|
@@ -130,45 +129,45 @@ elif False:
|
|
130
129
|
@pulumi.input_type
|
131
130
|
class BackendConfigScepAuthenticatorsArgs:
|
132
131
|
def __init__(__self__, *,
|
133
|
-
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
134
|
-
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
132
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
133
|
+
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
135
134
|
"""
|
136
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
137
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
135
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
|
136
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] scep: The accessor property for SCEP auth backends
|
138
137
|
"""
|
139
138
|
if cert is not None:
|
140
139
|
pulumi.set(__self__, "cert", cert)
|
141
140
|
if scep is not None:
|
142
141
|
pulumi.set(__self__, "scep", scep)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter
|
146
|
-
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
145
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
147
146
|
"""
|
148
147
|
The accessor and cert_role properties for cert auth backends
|
149
148
|
"""
|
150
149
|
return pulumi.get(self, "cert")
|
151
150
|
|
152
151
|
@cert.setter
|
153
|
-
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
152
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
154
153
|
pulumi.set(self, "cert", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter
|
158
|
-
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
157
|
+
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
159
158
|
"""
|
160
159
|
The accessor property for SCEP auth backends
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "scep")
|
163
162
|
|
164
163
|
@scep.setter
|
165
|
-
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
164
|
+
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
166
165
|
pulumi.set(self, "scep", value)
|
167
166
|
|
168
167
|
|
169
168
|
if not MYPY:
|
170
169
|
class BackendConfigScepExternalValidationArgsDict(TypedDict):
|
171
|
-
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
170
|
+
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
172
171
|
"""
|
173
172
|
The credentials to enable Microsoft Intune validation of SCEP requests
|
174
173
|
"""
|
@@ -178,37 +177,37 @@ elif False:
|
|
178
177
|
@pulumi.input_type
|
179
178
|
class BackendConfigScepExternalValidationArgs:
|
180
179
|
def __init__(__self__, *,
|
181
|
-
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
180
|
+
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
182
181
|
"""
|
183
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
182
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
184
183
|
"""
|
185
184
|
if intune is not None:
|
186
185
|
pulumi.set(__self__, "intune", intune)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter
|
190
|
-
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
189
|
+
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
191
190
|
"""
|
192
191
|
The credentials to enable Microsoft Intune validation of SCEP requests
|
193
192
|
"""
|
194
193
|
return pulumi.get(self, "intune")
|
195
194
|
|
196
195
|
@intune.setter
|
197
|
-
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
196
|
+
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
198
197
|
pulumi.set(self, "intune", value)
|
199
198
|
|
200
199
|
|
201
200
|
if not MYPY:
|
202
201
|
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
203
|
-
oid: pulumi.Input[
|
202
|
+
oid: pulumi.Input[_builtins.str]
|
204
203
|
"""
|
205
204
|
The OID for the policy identifier
|
206
205
|
"""
|
207
|
-
cps: NotRequired[pulumi.Input[
|
206
|
+
cps: NotRequired[pulumi.Input[_builtins.str]]
|
208
207
|
"""
|
209
208
|
The URL of the CPS for the policy identifier
|
210
209
|
"""
|
211
|
-
notice: NotRequired[pulumi.Input[
|
210
|
+
notice: NotRequired[pulumi.Input[_builtins.str]]
|
212
211
|
"""
|
213
212
|
A notice for the policy identifier
|
214
213
|
"""
|
@@ -218,13 +217,13 @@ elif False:
|
|
218
217
|
@pulumi.input_type
|
219
218
|
class SecretBackendRolePolicyIdentifierArgs:
|
220
219
|
def __init__(__self__, *,
|
221
|
-
oid: pulumi.Input[
|
222
|
-
cps: Optional[pulumi.Input[
|
223
|
-
notice: Optional[pulumi.Input[
|
220
|
+
oid: pulumi.Input[_builtins.str],
|
221
|
+
cps: Optional[pulumi.Input[_builtins.str]] = None,
|
222
|
+
notice: Optional[pulumi.Input[_builtins.str]] = None):
|
224
223
|
"""
|
225
|
-
:param pulumi.Input[
|
226
|
-
:param pulumi.Input[
|
227
|
-
:param pulumi.Input[
|
224
|
+
:param pulumi.Input[_builtins.str] oid: The OID for the policy identifier
|
225
|
+
:param pulumi.Input[_builtins.str] cps: The URL of the CPS for the policy identifier
|
226
|
+
:param pulumi.Input[_builtins.str] notice: A notice for the policy identifier
|
228
227
|
"""
|
229
228
|
pulumi.set(__self__, "oid", oid)
|
230
229
|
if cps is not None:
|
@@ -232,40 +231,40 @@ class SecretBackendRolePolicyIdentifierArgs:
|
|
232
231
|
if notice is not None:
|
233
232
|
pulumi.set(__self__, "notice", notice)
|
234
233
|
|
235
|
-
@property
|
234
|
+
@_builtins.property
|
236
235
|
@pulumi.getter
|
237
|
-
def oid(self) -> pulumi.Input[
|
236
|
+
def oid(self) -> pulumi.Input[_builtins.str]:
|
238
237
|
"""
|
239
238
|
The OID for the policy identifier
|
240
239
|
"""
|
241
240
|
return pulumi.get(self, "oid")
|
242
241
|
|
243
242
|
@oid.setter
|
244
|
-
def oid(self, value: pulumi.Input[
|
243
|
+
def oid(self, value: pulumi.Input[_builtins.str]):
|
245
244
|
pulumi.set(self, "oid", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter
|
249
|
-
def cps(self) -> Optional[pulumi.Input[
|
248
|
+
def cps(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
249
|
"""
|
251
250
|
The URL of the CPS for the policy identifier
|
252
251
|
"""
|
253
252
|
return pulumi.get(self, "cps")
|
254
253
|
|
255
254
|
@cps.setter
|
256
|
-
def cps(self, value: Optional[pulumi.Input[
|
255
|
+
def cps(self, value: Optional[pulumi.Input[_builtins.str]]):
|
257
256
|
pulumi.set(self, "cps", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter
|
261
|
-
def notice(self) -> Optional[pulumi.Input[
|
260
|
+
def notice(self) -> Optional[pulumi.Input[_builtins.str]]:
|
262
261
|
"""
|
263
262
|
A notice for the policy identifier
|
264
263
|
"""
|
265
264
|
return pulumi.get(self, "notice")
|
266
265
|
|
267
266
|
@notice.setter
|
268
|
-
def notice(self, value: Optional[pulumi.Input[
|
267
|
+
def notice(self, value: Optional[pulumi.Input[_builtins.str]]):
|
269
268
|
pulumi.set(self, "notice", value)
|
270
269
|
|
271
270
|
|